Cheat Detection in Cyber Security Capture The Flag Games - An Automated Cyber Threat Hunting Approach
Capture-the-flag style cyber security games (CTF) are one of the most popular ways of learning and teaching ethical hacking. These CTF games usually present a set of hacking tasks or challenges that simulate a vulnerability to be compromised. When the participant compromises the vulnerability they are presented with a secret flag that is uploaded to prove a participants completion of a challenge. Whilst this secret flag confirms successful completion of a challenge, it does little to verify the legitimacy of a participant’s activities. We propose a process for plagiarism detection in CTF games via automated cyber threat hunting techniques. Using log data captured from penetration testing courses, we develop a series of indicators of compromise for each CTF challenge that are attributed to a participant’s activities. We propose an automated querying tool that can query these IoCs and classifying participant activities as suspicious or benign without false positives.
Wed 17 NovDisplayed time zone: Brussels, Copenhagen, Madrid, Paris change
09:00 - 10:30 | Cyber RangeCall for Papers at Grand Auditorium Chair(s): Gurvan LE GUERNIC DGA MI & Université de Rennes 1 | ||
09:00 30mTalk | Cyber range automation, a bedrock for AI applications Call for Papers Media Attached | ||
09:30 30mTalk | Cheat Detection in Cyber Security Capture The Flag Games - An Automated Cyber Threat Hunting Approach Call for Papers Media Attached | ||
10:00 30mTalk | Reinforced Autonomous Agents with Attack-Defense Exercises in Realistic Environments Call for Papers Frédéric Guihéry AMOSSYS, Georges Bossert SEKOIA, Damien Crémilleux AMOSSYS, Édouard Klein SEKOIA, Olivier Tétard SEKOIA, Baptiste Gigodeaux SEKOIA Media Attached |