comprehensible for training-scenario developers
(White and Green Team), develops cyber-risk models
that facilitate real-time evaluation of participants in
training scenarios, and produces useful feedback to
the participants (Blue and Red Team) in terms of
grading and detailed evaluation of strengths and
weaknesses regarding cybersecurity skills.
As next steps, we will carry out empirical
evaluations focusing on user experience in the
abovementioned large-scale pilots and based on our
findings continue improving our method.
ACKNOWLEDGEMENTS
This work has been conducted as part of the
CYBERWISER.eu project (786668) funded by the
European Commission within the Horizon 2020
research and innovation programme.
REFERENCES
Ashok, A., Krishnaswamy, S., & Govindarasu, M. (2016).
PowerCyber: A remotely accessible testbed for Cyber
Physical security of the Smart Grid. Paper presented at
the 2016 IEEE Power & Energy Society Innovative
Smart Grid Technologies Conference (ISGT).
Beuran, R., Chinen, K.-i., Tan, Y., & Shinoda, Y. (2016).
Towards effective cybersecurity education and training
(IS-RR-2016-003). Retrieved from https://dspace.
jaist.ac.jp/dspace/handle/10119/13769
Beuran, R., Tang, D., Pham, C., Chinen, K.-i., Tan, Y., &
Shinoda, Y. (2018). Integrated framework for hands-on
cybersecurity training: CyTrONE. Computers &
Security, 78, 43-59.
Braghin, C., Cimato, S., Damiani, E., Frati, F., Mauri, L., &
Riccobene, E. (2019). A Model Driven Approach for
Cyber Security Scenarios Deployment. In Computer
Security (pp. 107-122): Springer.
CAPEC. (2020). Common Attack Pattern Enumeration and
Classification. Retrieved from https://capec.mitre.org/
index.html
CIISec. (2019). CIISec Roles Framework, Version 0.3.
Retrieved from https://www.ciisec.org/ CIISEC/
Resources/Roles_Framework.aspx
CWE. (2020). Common Weakness Enumeration. Retrieved
from https://cwe.mitre.org/
CYBERWISER.eu. (2019a). Deliverable 2.5, Platform
Design, Final Version. Retrieved from https://www.
cyberwiser.eu/
CYBERWISER.eu. (2019b). Deliverable 5.1, General
Requirements and Guidelines. Retrieved from
https://www.cyberwiser.eu/
CYBERWISER.eu. (2020a). CYBERWISER.eu - Cyber
Range & Capacity Building in Cybersecurity. Retrieved
from https://www.cyberwiser.eu/
CYBERWISER.eu. (2020b). Deliverable 2.6, Risk Model
Templates, Initial Version. Retrieved from
https://www.cyberwiser.eu/
Damodaran, S. K., & Smith, K. (2015). CRIS Cyber Range
Lexicon, Version 1.0. Retrieved from https://apps.dtic.
mil/dtic/tr/fulltext/u2/a627477.pdf
Davis, J., & Magrath, S. (2013). A survey of cyber ranges
and testbeds. Retrieved from https://apps.dtic.mil/
dtic/tr/fulltext/u2/a594524.pdf
ECSO. (2016). European Cybersecurity Strategic Research
and Innovation Agenda (SRIA) for a contractual
Public-Private-Partnership (cPPP). Retrieved from
https://www.ecs-org.eu/documents/ecs-cppp-sria.pdf
EnpitSecurity. (2020). SecCap. Retrieved from
https://www.seccap.jp/
Erdogan, G., Gonzalez, A., Refsdal, A., & Seehusen, F.
(2017). A method for developing algorithms for
assessing cyber-risk cost. Paper presented at the 2017
IEEE International Conference on Software Quality,
Reliability and Security (QRS).
Ferguson, B., Tall, A., & Olsen, D. (2014). National cyber
range overview. Paper presented at the 2014 IEEE
Military Communications Conference.
Lund, M. S., Solhaug, B., & Stølen, K. (2011). Model-
Driven Risk Analysis - The CORAS Approach:
Springer-Verlag Berlin Heidelberg.
NRISecure. (2020). Secure Eggs (Essentials and Global
Guidance for Security). Retrieved from https://www.
nri-secure.co.jp/service/learning/secureeggs
OWASP. (2020). Open Web Application Security Project.
Retrieved from https://owasp.org/
Pham, C., Tang, D., Chinen, K.-i., & Beuran, R. (2016).
Cyris: A cyber range instantiation system for
facilitating security training. Paper presented at the
Seventh Symposium on Information and
Communication Technology.
R-project. (2020). The R Project for Statistical Computing.
Retrieved from https://www.r-project.org/
Russo, E., Costa, G., & Armando, A. (2018). Scenario
design and validation for next generation cyber ranges.
Paper presented at the 2018 IEEE 17th International
Symposium on Network Computing and Applications.
Solhaug, B., & Stølen, K. (2013). The CORAS Language-
Why it is designed the way it is. Paper presented at the
11th International Conference on Structural Safety and
Reliability (ICOSSAR’13).
Somarakis, I., Smyrlis, M., Fysarakis, K., & Spanoudakis,
G. (2019). Model-Driven Cyber Range Training: A
Cyber Security Assurance Perspective. In Computer
Security (pp. 172-184): Springer.
Wieringa, R. J. (2014). Design science methodology for
information systems and software engineering:
Springer.
Yamin, M. M., Katt, B., & Gkioulos, V. (2020). Cyber
Ranges and Security Testbeds: Scenarios, Functions,
Tools and Architecture. Computers & Security, 88,
101636.