The complexity of current cyber infrastructures requires specialized security-oriented skills to be acquired by a variety of different actors, in order to defend critical systems and sensitive data against emerging security threats and attacks. In order to facilitate this process, advanced cybersecurity education and training programs should be considered, as well as platforms and tools for simulating realistic training scenarios should be exploited. This paper presents an open-source solution for simulating cyber infrastructures, and reproducing realistic Internet of Things (IoT) scenarios, with specific focus on Edge applications. It can be used for the implementation of new cooperative and competitive cybersecurity training exercises and skills for different application domains, as well as validate solutions that can be used to prevent, detect, mitigate, recovery, and evaluate the attack impact.

Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios

FICCO, MARCO;Palmieri F.
2019-01-01

Abstract

The complexity of current cyber infrastructures requires specialized security-oriented skills to be acquired by a variety of different actors, in order to defend critical systems and sensitive data against emerging security threats and attacks. In order to facilitate this process, advanced cybersecurity education and training programs should be considered, as well as platforms and tools for simulating realistic training scenarios should be exploited. This paper presents an open-source solution for simulating cyber infrastructures, and reproducing realistic Internet of Things (IoT) scenarios, with specific focus on Edge applications. It can be used for the implementation of new cooperative and competitive cybersecurity training exercises and skills for different application domains, as well as validate solutions that can be used to prevent, detect, mitigate, recovery, and evaluate the attack impact.
2019
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11386/4726326
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 27
  • ???jsp.display-item.citation.isi??? 17
social impact