Browse > Article

Markov Chain Model-Based Trainee Behavior Pattern Analysis for Assessment of Information Security Exercise Courses  

Lee, Taek (고려대학교 컴퓨터전파통신공학과)
Kim, Do-Hoon (고려대학교 컴퓨터전파통신공학과)
Lee, Myong-Rak (고려대학교 컴퓨터전파통신공학과)
In, Hoh Peter (고려대학교 컴퓨터전파통신공학과)
Abstract
In this paper, we propose a behavior pattern analysis method for users tasking on hands-on security exercise missions. By analysing and evaluating the observed user behavior data, the proposed method discovers some significant patterns able to contribute mission successes or fails. A Markov chain modeling approach and algorithm is used to automate the whole analysis process. How to apply and understand our proposed method is briefly shown through a case study, "network service configurations for secure web service operation".
Keywords
Behavior Pattern Analysis; Information Security Exercise; Evaluation Automation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Online information security e-learning center (http:// www.sis.or.kr)
2 Lance J. Hoffman, Tim Rosenberg, Ronald Dodge, and Daniel Ragsdale, "Exploring a National Cybersecurity Exercise for Universities," IEEE SECURITY & PRIVACY, Sep./Oct. 2005.
3 Taek Lee, Dohoon Kim, Yeonkyun Shin, Seungyong Shin, and Hoh Peter In, "An Architecture of Virtual Security Training Laboratory for Cybersecurity Exercise," Proceedings of The 30th Korea Information Processing Society Fall Conference, vol.15, no.2, pp.1462-1464, Nov. 2008.
4 Ji Hu, Christoph Meinel, and Michael Schmitt, "Tele-lab IT security: an architecture for interactive lessons for security education," Proceedings of the 35th SIGCSE technical symposium on Computer science education, 2004.
5 Jeremiah K. Jones and Gordon W. Romney, "Honeynets: an educational resource for IT security, Proceedings of the 5th conference on Information technology education, 2004.
6 Alfredo Milani, Judit Jasso, and Silvia Suriani, "Modeling Online User Behavior," IEEE International Conference on e-Business Engineering, pp.22-24, Oct. 2008.
7 Jose A. Iglesias, Plamen Angelov, Agapito Ledezma, and Araceli Sanchis, "Modeling Evolving User Behaviours," Evolving and Self-Developing Intelligent Systems, 2009.
8 Ashish Garg, Ragini Rahalkar, Shambhu Upadhyaya, and Kevin Kwiat, "Profiling Users in GUI based Systems for Masquerade Detection," IEEE Information Assurance Workshop, pp.48-54, 2006.
9 Debin Gao, Michael K. Reiter, and Dawn Song, "Behavioral Distance for Intrusion Detection," RAID 2005, LNCS 3858.