Hands-on cybersecurity training behavior data for process mining.

Data Brief

Faculty of Informatics, Masaryk University, Botanická 68a, Brno 60200, Czech Republic.

Published: February 2024

The research on using process mining in learning analytics of cybersecurity exercises relies on datasets that reflect the real behavior of trainees. Although modern cyber ranges, in which training sessions are organized, can collect behavioral data in the form of event logs, the organization of such exercises is laborious. Moreover, the collected raw data has to be processed and transformed into a specific format required by process mining techniques. We present two datasets with slightly different characteristics. While the first exercise with 52 participants was not limited in time, the second supervised exercise with 42 trainees lasted two hours. Also, the cybersecurity tasks were slightly different. A total of 11757 events were collected. Of these, 3597 were training progress events, 5669 were Bash commands, and 2491 were Metasploit commands. Joint CSV files distilled from the raw event data can be used as input for existing process mining tools.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10770710PMC
http://dx.doi.org/10.1016/j.dib.2023.109956DOI Listing

Publication Analysis

Top Keywords

process mining
16
hands-on cybersecurity
4
cybersecurity training
4
training behavior
4
data
4
behavior data
4
process
4
data process
4
mining
4
mining process
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!