D 2018

Evaluation of Cyber Defense Exercises Using Visual Analytics Process

OŠLEJŠEK, Radek; Jan VYKOPAL; Karolína BURSKÁ and Vít RUSŇÁK

Basic information

Original name

Evaluation of Cyber Defense Exercises Using Visual Analytics Process

Name in Czech

Vyhodnocování komplexních praktických obranných cvičení pomocí procesů vizuální analýzy

Authors

OŠLEJŠEK, Radek; Jan VYKOPAL; Karolína BURSKÁ and Vít RUSŇÁK

Edition

San Jose, California, USA, Proceedings of the 48th IEEE Frontiers in Education Conference (FIE'18), p. 1-9, 9 pp. 2018

Publisher

IEEE

Other information

Language

English

Type of outcome

Proceedings paper

Country of publisher

United States of America

Confidentiality degree

is not subject to a state or trade secret

Publication form

electronic version available online

Marked to be transferred to RIV

Yes

RIV identification code

RIV/00216224:14330/18:00103150

Organization

Fakulta informatiky – Repository – Repository

ISBN

978-1-5386-1173-9

UT WoS

000468396903041

EID Scopus

2-s2.0-85063427921

Keywords in English

visual analytics; cyber defense exercise; cyber range

Links

MUNI/A/1213/2017, interní kód Repo. VI20162019014, research and development project.
Changed: 5/9/2020 22:29, RNDr. Daniel Jakubík

Abstract

In the original language

This Innovative Practice Full Paper addresses modern cyber ranges which represent unified platforms that offer efficient organization of complex hands-on exercises where participants can train their cybersecurity skills. However, the functionality targets mostly learners who are the primary users. Support of organizers performing analytic and evaluation tasks is weak and ad-hoc. It makes harder to improve the quality of an exercise, particularly its impact on learners. In this paper, we present an application of a well-structured visual analytics process to the organization of cyber exercises. We illustrate that the classification derived from the adoption of the visual analytics process helps to clarify and formalize analytical tasks of educators and enables their systematic support in cyber ranges. We demonstrate an application of our approach on a particular series of eight exercises we have organized in last three years. We believe the presented approach is beneficial for anyone involved in preparation and execution of any complex exercise.
Displayed: 6/5/2026 22:00