MACÁK, Martin, Radek OŠLEJŠEK and Barbora BÜHNOVÁ. Process Mining Analysis of Puzzle-Based Cybersecurity Training. Online. In Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1 (ITiCSE '22). New York, NY, USA: Association for Computing Machinery, 2022, p. 449-455. ISBN 978-1-4503-9201-3. Available from: https://dx.doi.org/10.1145/3502718.3524819.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Process Mining Analysis of Puzzle-Based Cybersecurity Training
Authors MACÁK, Martin (703 Slovakia, guarantor, belonging to the institution), Radek OŠLEJŠEK (203 Czech Republic, belonging to the institution) and Barbora BÜHNOVÁ (203 Czech Republic, belonging to the institution).
Edition New York, NY, USA, Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1 (ITiCSE '22), p. 449-455, 7 pp. 2022.
Publisher Association for Computing Machinery
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher United Kingdom of Great Britain and Northern Ireland
Confidentiality degree is not subject to a state or trade secret
Publication form electronic version available online
WWW Permalink to the publisher Accepted manuscript (arxiv.org)
RIV identification code RIV/00216224:14330/22:00125555
Organization unit Faculty of Informatics
ISBN 978-1-4503-9201-3
ISSN 1942-647X
Doi http://dx.doi.org/10.1145/3502718.3524819
UT WoS 001037375600068
Keywords (in Czech) kyberbezpečnostní vzdělávání, CTF hry; procesní modelování, datová analýza
Keywords in English cybersecurity training; CTF game; process mining; data analysis
Tags core_A, firank_A
Tags International impact, Reviewed
Changed by Changed by: doc. RNDr. Radek Ošlejšek, Ph.D., učo 3636. Changed: 19/12/2023 17:08.
Abstract
The hands-on cybersecurity training quality is crucial to mitigate cyber threats and attacks effectively. However, practical cybersecurity training is strongly process-oriented, making the post-training analysis very difficult. This paper presents process-mining methods applied to the learning analytics workflow. We introduce a unified approach to reconstruct behavioral graphs from sparse event logs of cyber ranges. Furthermore, we discuss significant data features that affect their practical usability for educational process mining. Based on that, methods of dealing with the complexity of process graphs are presented, taking advantage of the puzzle-based gamification of in-class training sessions.
Links
MUNI/A/1230/2021, interní kód MUName: Zapojení studentů Fakulty informatiky do mezinárodní vědecké komunity 22 (Acronym: SKOMU)
Investor: Masaryk University
VI20202022158, research and development projectName: Výzkum nových technologií pro zvýšení schopností odborníků na kyberbezpečnost (Acronym: KYPOLAB)
Investor: Ministry of the Interior of the CR, Research of New Technologies to Increase the Capabilities of Cybersecurity Experts
Type Name Uploaded/Created by Uploaded/Created Rights
2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper.pdf   File version Ošlejšek, R. 4/8/2022

Properties

Address within IS
https://is.muni.cz/auth/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper.pdf
Address for the users outside IS
https://is.muni.cz/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper.pdf
Address within Manager
https://is.muni.cz/auth/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper.pdf?info
Address within Manager for the users outside IS
https://is.muni.cz/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper.pdf?info
Uploaded/Created
Thu 4/8/2022 13:25, doc. RNDr. Radek Ošlejšek, Ph.D.

Rights

Right to read
  • anyone on the Internet
  • a concrete person doc. RNDr. Radek Ošlejšek, Ph.D., učo 3636
  • a concrete person doc. Ing. RNDr. Barbora Bühnová, Ph.D., učo 39394
  • a concrete person RNDr. Martin Macák, Ph.D., učo 410452
Right to upload
 
Right to administer:
  • a concrete person doc. RNDr. Radek Ošlejšek, Ph.D., učo 3636
  • a concrete person RNDr. Pavel Šmerk, Ph.D., učo 3880
  • a concrete person doc. Ing. RNDr. Barbora Bühnová, Ph.D., učo 39394
  • a concrete person RNDr. Martin Macák, Ph.D., učo 410452
Attributes
 

2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper.pdf

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper.pdf
Address for the users outside IS
https://is.muni.cz/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper.pdf
File type
PDF (application/pdf)
Size
708 KB
Hash md5
0822482f6db3dec478b74e938a60f85b
Uploaded/Created
Thu 4/8/2022 13:25

2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper_Archive.pdf

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper_Archive.pdf
Address for the users outside IS
https://is.muni.cz/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper_Archive.pdf
File type
PDF/A (application/x-pdf)
Size
4,1 MB
Hash md5
ff7548102f404dd5979b3476c76d3992
Uploaded/Created
Thu 4/8/2022 13:43

2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper.txt

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper.txt
Address for the users outside IS
https://is.muni.cz/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-paper.txt
File type
plain text (text/plain)
Size
43,6 KB
Hash md5
a389014a5af2362f538c80daf3ce14d5
Uploaded/Created
Thu 4/8/2022 13:44
2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation.pdf  Ošlejšek, R. 4/8/2022

Properties

Address within IS
https://is.muni.cz/auth/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation.pdf
Address for the users outside IS
https://is.muni.cz/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation.pdf
Address within Manager
https://is.muni.cz/auth/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation.pdf?info
Address within Manager for the users outside IS
https://is.muni.cz/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation.pdf?info
Uploaded/Created
Thu 4/8/2022 13:29, doc. RNDr. Radek Ošlejšek, Ph.D.

Rights

Right to read
  • anyone on the Internet
  • a concrete person doc. RNDr. Radek Ošlejšek, Ph.D., učo 3636
  • a concrete person doc. Ing. RNDr. Barbora Bühnová, Ph.D., učo 39394
  • a concrete person RNDr. Martin Macák, Ph.D., učo 410452
Right to upload
 
Right to administer:
  • a concrete person doc. RNDr. Radek Ošlejšek, Ph.D., učo 3636
  • a concrete person RNDr. Pavel Šmerk, Ph.D., učo 3880
  • a concrete person doc. Ing. RNDr. Barbora Bühnová, Ph.D., učo 39394
  • a concrete person RNDr. Martin Macák, Ph.D., učo 410452
Attributes
 

2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation.pdf

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation.pdf
Address for the users outside IS
https://is.muni.cz/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation.pdf
File type
PDF (application/pdf)
Size
845,8 KB
Hash md5
695bb80df5763bb7245be6b1f18be30a
Uploaded/Created
Thu 4/8/2022 13:29

2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation_Archive.pdf

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation_Archive.pdf
Address for the users outside IS
https://is.muni.cz/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation_Archive.pdf
File type
PDF/A (application/x-pdf)
Size
8,3 MB
Hash md5
a37485e67ec30dba3398bd9fc9eca8da
Uploaded/Created
Thu 4/8/2022 13:43

2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation.txt

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation.txt
Address for the users outside IS
https://is.muni.cz/publication/1842421/2022-iticse-process-mining-analysis-puzzle-based-cybersecurity-training-presentation.txt
File type
plain text (text/plain)
Size
9,3 KB
Hash md5
7484439f31b761e1801e48df6d64df8b
Uploaded/Created
Thu 4/8/2022 13:44
Print
Report a file uploaded without authorization. Displayed: 25/5/2024 23:48