Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Andreas Eipper and Daniela Pöhn

Affiliation: Universität der Bundeswehr München, Neubiberg, Germany

Keyword(s): Cyber Range, Scenario Design, Brute-Force Attack, Training Scenario.

Abstract: Cyber attacks are ubiquitous and a constantly growing threat in the age of digitization. In order to protect important data, developers and system administrators must be trained and made aware of possible threats. Practical training can be used for students alike to introduce them to the topic. A constant threat to websites that require user authentication is so-called brute-force attacks, which attempt to crack a password by systematically trying every possible combination. As this is a typical threat, but comparably easy to detect, it is ideal for beginners. Therefore, three open-source blue team scenarios are designed and systematically described. They are contiguous to maximize the learning effect.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.144.117.226

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Eipper, A. and Pöhn, D. (2023). How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications. In Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-624-8; ISSN 2184-4356, SciTePress, pages 477-484. DOI: 10.5220/0011667300003405

@conference{icissp23,
author={Andreas Eipper and Daniela Pöhn},
title={How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications},
booktitle={Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP},
year={2023},
pages={477-484},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011667300003405},
isbn={978-989-758-624-8},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP
TI - How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications
SN - 978-989-758-624-8
IS - 2184-4356
AU - Eipper, A.
AU - Pöhn, D.
PY - 2023
SP - 477
EP - 484
DO - 10.5220/0011667300003405
PB - SciTePress