The complexity of current cyber infrastructures requires specialized security-oriented skills to be acquired by a variety of different actors, in order to defend critical systems and sensitive data against emerging security threats and attacks. In order to facilitate this process, advanced cybersecurity education and training programs should be considered, as well as platforms and tools for simulating realistic training scenarios should be exploited. This paper presents an open-source solution for simulating cyber infrastructures, and reproducing realistic Internet of Things (IoT) scenarios, with specific focus on Edge applications. It can be used for the implementation of new cooperative and competitive cybersecurity training exercises and skills for different application domains, as well as validate solutions that can be used to prevent, detect, mitigate, recovery, and evaluate the attack impact.

Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios

Ficco M.
;
2019

Abstract

The complexity of current cyber infrastructures requires specialized security-oriented skills to be acquired by a variety of different actors, in order to defend critical systems and sensitive data against emerging security threats and attacks. In order to facilitate this process, advanced cybersecurity education and training programs should be considered, as well as platforms and tools for simulating realistic training scenarios should be exploited. This paper presents an open-source solution for simulating cyber infrastructures, and reproducing realistic Internet of Things (IoT) scenarios, with specific focus on Edge applications. It can be used for the implementation of new cooperative and competitive cybersecurity training exercises and skills for different application domains, as well as validate solutions that can be used to prevent, detect, mitigate, recovery, and evaluate the attack impact.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11591/412876
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 27
  • ???jsp.display-item.citation.isi??? 17
social impact