A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory
IEEE Transactions on Dependable and Secure Computing
Towards the Support of Scaffolding in Customizable Puzzle-Based Learning Games
ICCSA '11 Proceedings of the 2011 International Conference on Computational Science and Its Applications
Experiences in cyber security education: the MIT Lincoln laboratory capture-the-flag exercise
CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
Game theoretic resistance to denial of service attacks using hidden difficulty puzzles
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
IEEE Transactions on Education
Hi-index | 0.00 |
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and functionalities, both in software and hardware, making it very difficult for users to realize that they are under cyber attack or the cause of data breach, etc. It is also well-known fact that vulnerabilities at one component can affect other components in any computing device. But it is hard to realize the interdependencies of various components in order to secure the entire path to in and out of a cyber system. Puzzle-based Learning approach proved to have improved learning environment including mathematics, physics and computer science, however, there is very little work has been done in computer and cyber security. We introduced the Puzzle-based Learning to basic cyber security education. We believe that such an interactive learning environment will help students to understand complex attack paths and countermeasures for fraud detection, cybercrime, and advanced persistent threats (APTs). Students can learn not only to protect a specific system but also for a class of Internet-enabled systems with different hardware/software components and architecture, providing similar services.