CounterMeasures: An Interactive Game for Security Training Advised by: Mark Claypool Kathi Fisler Craig Jordan (IMGD) Matt Knapp (CS) Dan Mitchell (CS)

Slides:



Advertisements
Similar presentations
Computer programming Computer Programmer The job is computer programming and security, and includes making and running programs plus keeping them protected.
Advertisements

Tom Sels Belgium Academic Village Barcelona May 2003 Multimedia Programmes to Teach Practical and Industrial Experience during the Education Tom.
Cross-Curricular activity By Carlos Ueno Jacue. School: IES LA VEGA DE SAN JOSÉ Teacher(s): Carlos Ueno / Jerónimo / Margarita Form/N. of students: Up.
3/10/07ACM SIGCSE'071 SEED: A Suite of Instructional Laboratories for Computer SEcurity EDucation Wenliang (Kevin) Du Zhouxuan Teng & Ronghua Wang Department.
A Complete Tool For System Penetration Testing Presented By:- Mahesh Kumar Sharma B.Tech IV Year Computer Science Roll No. :- CS09047.
Practical Training of Information Security Masahito Gotaishi, R & D Initiative, Chuo Universty.
Application, Network and Link Layer Measurements of Streaming Video over a Wireless Campus Network Passive & Active Measurement Workshop 05 Boston, MA,
Brainstorm About Computer Networks Take 3-4 minutes to write –Include your name (I’ll collect and read, but not grade) What are some network applications?
How’s My Network (HMN)? A Java approach to Home Network Measurement Alan Ritacco, Craig Wills, and Mark Claypool Computer Science Department Worcester.
Relating Cognitive Models of Computer Games to User Evaluations of Entertainment Paolo Piselli, Mark Claypool Worcester Polytechnic Institute Worcester,
Perspectives, Frame Rates and Resolutions: It's all in the Game Mark Claypool Kajal Claypool Worcester Polytechnic Institute Worcester, MA, USA
Mark Claypool’s MQP Projects Network Games Streaming Media.
CounterMeasures: A Game for Teaching Computer Security Craig Jordan, Matt Knapp, Dan Mitchell, Mark Claypool and Kathi Fisler CS and IMGD Worcester Polytechnic.
Network Characteristics for Server Selection in Online Games Mark Claypool Computer Science Department Worcester Polytechnic Institute Worcester, Massachusetts,
Facing New Challenges in Learning Paraskeva, Mysirlaki, Papagianni (2009) Multiplayer Online Games as Educational Tools.
The Effects of Loss and Latency on User Performance in Unreal Tournament 2003 Tom Beigbeder, Rory Coughlan, Corey Lusher, John Plunkett, Emmanuel Agu,
Welcome to EECS 354 Network Penetration and Security.
Expert Report By Prof. Rayko Genchev Raykov, Ph.D. On the research of experts’ views on the problems considered in the project “New Approach in Technology.
Yan Chen Dept. of Computer Science Northwestern University Information Security Curriculum Development in Northwestern.
In the Computer Science program 5 years experience with Java developing service apps for enterprise storage servers No artistic ability Only graphics /
CAPTURE THE FLAG (CTF) Maxim A. Kulakov (Vladimir State University)
IMPLEMENTATION OF AN E-LEARNING PLATFORM USING CMS
CS4513 Distributed Computer Systems Mark Claypool.
CS533 Modeling and Performance Evaluation of Network and Computer Systems Mark Claypool.
Hong Kong University of Science and Technology Final Year Project 2006  2007 Presentation Present by HO3 Hau Yin Wing Amy Lam Chun Kit Ron Wu Ka Chun.
Mark Claypool’s MQP Projects Network Games Streaming Media.
The Computer Science Course at Omar Al-Mukhtar University, Libya The Computer Science Course at Omar Al-Mukhtar University, Libya User-Centered Design.
Computer Science Department 1 An Open Source Laboratory for Operating Systems Projects * Mark Claypool, David Finkel, Craig Wills Computer Science Department.
P INNOVATION IN TEACHING AND LEARNING IN HIGHER EDUCATION WITH 3D VIRTUAL TECHNOLOGIES Fernando Maciel Barbosa M. Travassos Valdez 1, C. Machado.
Tcipg.org 1 An Alert Buffer Overflow Attack in DNP3 Controlled SCADA Systems Objectives/Problem Investigate a simple but effective attack to block legitimated.
Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs
Administrative IMGD Topics Background Admin Stuff Motivation Objectives Class material! 2.
Evaluation and analysis of the application of interactive digital resources in a blended-learning methodology for a computer networks subject F.A. Candelas,
Addressing the Pre-service Learning Needs of Education Majors in Math and Science Through Technology
Dr. Gankam Tambo Erick United Nations University - Institute for Environment and Human Security (UNU-EHS) e/merge 2012 Open to Change Framework for virtual.
1 Chapter No 3 ICT IN Science,Maths,Modeling, Simulation.
SCOTT KURODA ADVISOR: DR. FRANZ KURFESS Encouraging Secure Programming Practice in Academia.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
What’s Going On? This is a “Capture The Flag” hacking contest Teams from a number of Universities/Institutions compete against each other Each team has.
Project MLExAI Machine Learning Experiences in AI Ingrid Russell, University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 IT Essentials PC Hardware and Software v4.0 Pete Lawrence June 2007.
Networking Our Neighborhoods: Literacy Efforts in Public Housing Communities Jenny Fertig Extension Specialist Community and Economic Development West.
University of Leeds Ethnicity and Cultural Diversity Network The Globe Centre, Accrington 22 nd September 2005.
Mark Claypool’s MQP Projects Network Games Streaming Media.
CAPTURE THE FLAG Introductions beer brew man dutchrowboat.
Delivering e-Security Education through e-Learning V.K.Sharma Lakshmi Kalyani CDAC, Noida.
1/19/2010Cyber Security Spring 2010 Introduction to Cyber Security Lab CS460 Susan Hinrichs Spring 2010.
A Taxonomy of Online Game Attacks and Defenses Presentation Computer and Communication Security Laboratory Korea University.
Latency Can Kill: Precision and Deadline in Online Games Mark Claypool Professor of CS Director of IMGD Worcester Polytechnic Institute Kajal Claypool.
I-Hack’08 International Hacking Competition “Details”
Teaching Systems Analysis and Design in a Practical Way: A Collaborative Effort Between Computer Science and Business School by Ken Surendran-CS Chellappa.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Presenter: Han, Yi-Ti Adviser: Chen, Ming-Puu Date: March 02, 2009 Papastergiou, M.(2009). Digital Game-Based Learning in high school Computer Science.
Designing Web-Based Adaptive Support for Debate with Dialogue Modelling John Cook Learning Technology Research Institute
Exploring Problem Solving With Software, Apps, and Games By: Brittney Wynter.
1 컴퓨터 교육 2 학기 김혜원 Teaching Networking and Operating System to Information Systems Majors D. Robert Adams and Carl Erickson Department of computer Science.
Goals The DNP3 protocol is widely used in electrical power systems as a means of communicating observed sensor state information back to a control center.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
KIDS GRANT. The Grant Department of Education Technology Innovation Challenge Grant Classroom technology integration Key Instructional Design Strategies.
CS4513 Distributed Computing Systems C-term 2016 Mark Claypool.
Administrative IMGD Topics Background Admin Stuff Motivation Objectives Class material! 2.
What does it take to teach clinical lab-based skills online? Prof Isabelle Skinner Assoc Dean Research and Research Training EHSE Creative Digital Learning.
Coding Connections at the Interface of Algebra I and Physical World Concepts Improving Teacher Quality Grant Program Summer 2016.
OCLC Online Computer Library Center 1 Introduction.
New Forms of Experiential Education on Cyber-Physical Security
CHALLENGES Users growing and becoming more demanding
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
Training the Future Cyber Security Specialist: A Novel Approach
REMTOTE LABS Dr. Mohammad Irfan Ahmad Department of Geology
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Presentation transcript:

CounterMeasures: An Interactive Game for Security Training Advised by: Mark Claypool Kathi Fisler Craig Jordan (IMGD) Matt Knapp (CS) Dan Mitchell (CS)

Introduction Computer and network use is growing! Security is getting more important –But where do I learn about it? –How do I practice it? What about a game? –With REAL knowledge and tools –And real-world simulations –That’s actually interesting! Worcester Polytechnic Institute 2

Related Work Books – simple to very complex –Tend to be boring, dry, long, very technical Games – fun, interesting –Not real security skills, just puzzle games Online challenges – try various techniques –Very little help/instruction offered Competitions – Capture the Flag –Good luck getting started at DEFCON! Worcester Polytechnic Institute 3

Architecture & Implementation Worcester Polytechnic Institute 4 Game Elements and Design –Educational –Emphasizes Realism Technical Specifications –Client/Server –Adobe Flex –AIR –Java

Architecture & Implementation Worcester Polytechnic Institute 5

Missions Training 1: Finding your Target –Teaches basics of Scanning a remote System Training 2: Bypassing Authentication –Teaches basics of a Buffer Overflow Attack Training 3: Discovering Passwords –Teaches basics of Format String Vulnerabilities Mission 1: Hacking 101 –Test of all Skills that have been learned Worcester Polytechnic Institute 6

Evaluation Main Goals –Educate Users about Cyber Security –Have fun playing the Game Demographic –General Technical Background Computer Science Information Technology Other related Fields –20 Users in experiment Worcester Polytechnic Institute 7

Evaluation: Design Evaluation –Performance Statistics –Questionnaires Control Group –Given Reading Material Experimental Group –Play through the training missions of the game Both Groups –Pre- and Post- Questionnaires –Play Final Challenge of Game Worcester Polytechnic Institute 8

Evaluation: Setup Environment Setup –WPI Fossil Lab –Two Laptops running Countermeasures –Two Desktops running a shell for Control Group Obtaining Users –Mass to CS and IMGD majors –Solicited participants from a mid-level OS class –Students informed that we needed users to participate in a study for our MQP related to Security Worcester Polytechnic Institute 9

Analysis Worcester Polytechnic Institute 10

Analysis Worcester Polytechnic Institute 11

Analysis Worcester Polytechnic Institute 12 Interest in computer security before experiment Interest in computer security after experiment

Conclusion Game as a teaching tool for computer security can be effective –Shorter amount of time and higher rate of user engagement Interest in computer security strengthened through hands-on training Worcester Polytechnic Institute 13

Future Work Greater depth in scoring and complexity in missions Different forms game could take –Direct extension –Multiplayer –Unix environment Worcester Polytechnic Institute 14