D
2022
Process Mining Analysis of Puzzle-Based Cybersecurity Training
MACÁK, Martin; Radek OŠLEJŠEK and Barbora BÜHNOVÁ
Basic information
Original name
Process Mining Analysis of Puzzle-Based Cybersecurity Training
Authors
MACÁK, Martin; Radek OŠLEJŠEK and Barbora BÜHNOVÁ
Edition
New York, NY, USA, Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1 (ITiCSE '22), p. 449-455, 7 pp. 2022
Publisher
Association for Computing Machinery
Other information
Type of outcome
Proceedings paper
Country of publisher
United Kingdom of Great Britain and Northern Ireland
Confidentiality degree
is not subject to a state or trade secret
Publication form
electronic version available online
Marked to be transferred to RIV
Yes
RIV identification code
RIV/00216224:14330/22:00125555
Organization
Fakulta informatiky – Repository – Repository
Keywords (in Czech)
kyberbezpečnostní vzdělávání, CTF hry; procesní modelování, datová analýza
Keywords in English
cybersecurity training; CTF game; process mining; data analysis
Links
MUNI/A/1230/2021, interní kód Repo. VI20202022158, research and development project.
In the original language
The hands-on cybersecurity training quality is crucial to mitigate cyber threats and attacks effectively. However, practical cybersecurity training is strongly process-oriented, making the post-training analysis very difficult. This paper presents process-mining methods applied to the learning analytics workflow. We introduce a unified approach to reconstruct behavioral graphs from sparse event logs of cyber ranges. Furthermore, we discuss significant data features that affect their practical usability for educational process mining. Based on that, methods of dealing with the complexity of process graphs are presented, taking advantage of the puzzle-based gamification of in-class training sessions.
Displayed: 4/5/2026 12:59