Dataset: Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training
Authors/Creators
- 1. Masaryk University
Description
This repository contains supplementary materials for the following conference paper:
Valdemar Švábenský, Jan Vykopal, Daniel Tovarňák, Pavel Čeleda.
Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training.
In Proceedings of the 51st IEEE Frontiers in Education Conference (FIE 2021).
https://doi.org/10.1109/FIE49875.2021.9637052
Preprint available at: https://arxiv.org/abs/2112.11118
How to cite
If you use or build upon the materials, please use the BibTeX entry below to cite the original paper (not only this web link).
Some of the linked repositories have their separate citation entry; please use that one as well, if possible.
@inproceedings{Svabensky2021toolset,
author = {\v{S}v\'{a}bensk\'{y}, Valdemar and Vykopal, Jan and Tovar\v{n}\'{a}k, Daniel and \v{C}eleda, Pavel},
title = {{Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training}},
booktitle = {Proceedings of the 51st IEEE Frontiers in Education Conference},
series = {FIE '21},
location = {Lincoln, NE, USA},
publisher = {IEEE},
address = {New York, NY, USA},
month = {10},
year = {2021},
pages = {1--9},
numpages = {9},
isbn = {978-1-6654-3851-3},
url = {https://doi.org/10.1109/FIE49875.2021.9637052},
doi = {10.1109/FIE49875.2021.9637052},
}
Structure of the repository
We share four types of content described below. Each of the four types of materials includes:
- a link to an up-to-date GitLab repository, which may contain possible future revisions and error corrections, and
- a ZIP archive here on Zenodo that serves as a snapshot of the state when the article was published.
Attached content
- Logging toolset. It is implemented in the form of Ansible roles and consists of three separate projects: for Bash logging, Metasploit logging, and log forwarding within the sandbox.
- Sample training. To quickly test the toolset, instantiate the exemplary cybersecurity game called Junior hacker training. It already deploys the logging; no further setup is needed.
- Dataset. The data collected with the toolset are available at this repository, which is being gradually updated with new data. Attached is a subset of this repository that includes the data analyzed in the paper.
- Analytical tools. To analyze the data, you can either use the attached Python scripts, or instantiate this project for ELK.
Notes
Files
1. Logging toolset.zip
Additional details
Related works
- Is supplement to
- Conference paper: 10.1109/FIE49875.2021.9637052 (DOI)