Published July 23, 2021 | Version v1
Dataset Open

Dataset: Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training

  • 1. Masaryk University

Description

This repository contains supplementary materials for the following conference paper:

Valdemar Švábenský, Jan Vykopal, Daniel Tovarňák, Pavel Čeleda.
Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training.
In Proceedings of the 51st IEEE Frontiers in Education Conference (FIE 2021).
https://doi.org/10.1109/FIE49875.2021.9637052

Preprint available at: https://arxiv.org/abs/2112.11118

How to cite

If you use or build upon the materials, please use the BibTeX entry below to cite the original paper (not only this web link).

Some of the linked repositories have their separate citation entry; please use that one as well, if possible.

@inproceedings{Svabensky2021toolset,
    author    = {\v{S}v\'{a}bensk\'{y}, Valdemar and Vykopal, Jan and Tovar\v{n}\'{a}k, Daniel and \v{C}eleda, Pavel},
    title     = {{Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training}},
    booktitle = {Proceedings of the 51st IEEE Frontiers in Education Conference},
    series    = {FIE '21},
    location  = {Lincoln, NE, USA},
    publisher = {IEEE},
    address   = {New York, NY, USA},
    month     = {10},
    year      = {2021},
    pages     = {1--9},
    numpages  = {9},
    isbn      = {978-1-6654-3851-3},
    url       = {https://doi.org/10.1109/FIE49875.2021.9637052},
    doi       = {10.1109/FIE49875.2021.9637052},
}

Structure of the repository

We share four types of content described below. Each of the four types of materials includes:

  • a link to an up-to-date GitLab repository, which may contain possible future revisions and error corrections, and
  • a ZIP archive here on Zenodo that serves as a snapshot of the state when the article was published.

Attached content

  1. Logging toolset. It is implemented in the form of Ansible roles and consists of three separate projects: for Bash logging, Metasploit logging, and log forwarding within the sandbox.
  2. Sample training. To quickly test the toolset, instantiate the exemplary cybersecurity game called Junior hacker training. It already deploys the logging; no further setup is needed.
  3. Dataset. The data collected with the toolset are available at this repository, which is being gradually updated with new data. Attached is a subset of this repository that includes the data analyzed in the paper.
  4. Analytical tools. To analyze the data, you can either use the attached Python scripts, or instantiate this project for ELK.

Notes

This research was supported by ERDF project CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence' (No. CZ.02.1.01/0.0/0.0/16_019/0000822).

Files

1. Logging toolset.zip

Files (1.1 MB)

Name Size Download all
md5:b67fd235629a918e98694f5aabea382c
17.7 kB Preview Download
md5:183284ba5adacec1e7efd64ed1254859
1.0 MB Preview Download
md5:9c6bdd25984658222d4975db8810ccc5
88.8 kB Preview Download
md5:0de776031b2a0c12c53a26a64886f945
4.9 kB Preview Download

Additional details

Related works

Is supplement to
Conference paper: 10.1109/FIE49875.2021.9637052 (DOI)