Dataset of shell commands used by participants of hands-on cybersecurity training

. 2021 Oct ; 38 () : 107398. [epub] 20210922

Status PubMed-not-MEDLINE Jazyk angličtina Země Nizozemsko Médium electronic-ecollection

Typ dokumentu časopisecké články

Perzistentní odkaz   https://www.medvik.cz/link/pmid34621929
Odkazy

PubMed 34621929
PubMed Central PMC8479389
DOI 10.1016/j.dib.2021.107398
PII: S2352-3409(21)00680-6
Knihovny.cz E-zdroje

We present a dataset of 13446 shell commands from 175 participants who attended cybersecurity training and solved assignments in the Linux terminal. Each acquired data record contains a command with its arguments and metadata, such as a timestamp, working directory, and host identification in the emulated training infrastructure. The commands were captured in Bash, ZSH, and Metasploit shells. The data are stored as JSON records, enabling vast possibilities for their further use in research and development. These include educational data mining, learning analytics, student modeling, and evaluating machine learning models for intrusion detection. The data were collected from 27 cybersecurity training sessions using an open-source logging toolset and two open-source interactive learning environments. Researchers and developers may use the dataset or deploy the learning environments with the logging toolset to generate their own data in the same format. Moreover, we provide a set of common analytical queries to facilitate the exploratory analysis of the dataset.

Zobrazit více v PubMed

Švábenský V., Vykopal J., Tovarňák D., Čeleda P. Proceedings of the 51st IEEE Frontiers in Education Conference. IEEE; New York, NY, USA: 2021. Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training [in press] pp. 1–9. (FIE ’21).

Vykopal J., Čeleda P., Seda P., Švábenský V., Tovarňák D. Proceedings of the 51st IEEE Frontiers in Education Conference. IEEE; New York, NY, USA: 2021. Scalable Learning Environments for Teaching Cybersecurity Hands-on [in press] pp. 1–9. (FIE ’21).

Vinlove Q., Mache J., Weiss R. Predicting student success in cybersecurity exercises with a support vector classifier. J. Comput. Sci. Coll. 2020;36(1):26–34. doi: 10.5555/3447051.3447055. DOI

C. Ramey, B. Fox, Bash Reference Manual, Version 5.1, 2020, Accessed: 2021-09-20, https://www.gnu.org/savannah-checkouts/gnu/bash/manual.

Robby Russell & Contributors, Oh My Zsh, 2020, Accessed: 2021-09-20, https://ohmyz.sh.

Offensive Security, Metasploit Unleashed, 2021, Accessed: 2021-09-20, https://www.offensive-security.com/metasploit-unleashed/.

V. Švábenský, J. Vykopal, P. Seda, P. Čeleda, Dataset: Shell Commands Used by Participants of Hands-on Cybersecurity Training, 2021, doi:10.5281/zenodo.5517479 PubMed DOI PMC

Masaryk University, KYPO Cyber Range Platform, 2021a, Accessed: 2021-09-20, https://www.kypo.cz.

Masaryk University, Cyber Sandbox Creator, 2021b, Accessed: 2021-09-20, https://gitlab.ics.muni.cz/muni-kypo-csc/cyber-sandbox-creator.

Kraut R.E., Hanson S.J., Farber J.M. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Association for Computing Machinery; New York, NY, USA: 1983. Command Use and Interface Design; pp. 120–124. (CHI ’83). DOI

Maennel K. 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS PW) 2020. Learning Analytics Perspective: Evidencing Learning from Digital Datasets in Cybersecurity Exercises; pp. 27–36. DOI

Garae J., Ko R.K.L., Kho J., Suwadi S., Will M.A., Apperley M. 2017 IEEE Trustcom/BigDataSE/ICESS. 2017. Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors; pp. 1123–1130. DOI

Lin X.V., Wang C., Zettlemoyer L., Ernst M.D. Proceedings of the Eleventh International Conference on Language Resources and Evaluation LREC. 2018. NL2Bash: A Corpus and Semantic Parser for Natural Language Interface to the Linux Operating System; pp. 1–12.

Schonlau M., DuMouchel W., Ju W.-H., Karr A.F., Theus M., Vardi Y. Computer intrusion: detecting masquerades. Statistical Science. 2001;16(1):58–74.

S. Greenberg, Using Unix: Collected traces of 168 users(1988). doi:10.11575/PRISM/30806 DOI

DEF CON, CTF Archive, 2021, Accessed: 2021-09-20, https://defcon.org/html/links/dc-ctf.html.

Tovarňák D., Špaček S., Vykopal J. Traffic and log data captured during a cyber defense exercise. Data in Brief. 2020;31 doi: 10.1016/j.dib.2020.105784. PubMed DOI PMC

Munaiah N., Pelletier J., Su S.-H., Yang S., Meneely A. Hawaii International Conference on System Sciences. 2019. A Cybersecurity Dataset Derived from the National Collegiate Penetration Testing Competition; pp. 1–6.

Najít záznam

Citační ukazatele

Nahrávání dat ...

Možnosti archivace

Nahrávání dat ...