TY - GEN
T1 - Development and validation of the Air Force Cyber Intruder Alert Testbed (CIAT)
AU - Funke, Gregory
AU - Dye, Gregory
AU - Borghetti, Brett
AU - Mancuso, Vincent
AU - Greenlee, Eric
AU - Miller, Brent
AU - Menke, Lauren
AU - Brown, Rebecca
AU - Vieane, Alex
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2016.
PY - 2016
Y1 - 2016
N2 - Presently, cyber defense heavily relies on human network analysts who must detect and investigate potential suspicious activity, a demanding, fatiguing process that takes a heavy toll on human operators. Given the criticality of these operators to cyber defense, research is needed to investigate and mitigate the sources of those challenges. Currently, few cyber-focused synthetic task environments (STEs) exist, and those that do are not well suited to investigate the problems of network analysts. Therefore, a new cyber STE focused on network analysts called the Air Force Cyber Intruder Alert Testbed (CIAT) was developed. This STE was designed to emulate key functions of Enterprise-level cyber defense platforms. Specifically, CIAT simulates a network analyst environment, including an intrusion detection system, signature database, packet capture software, and network list. The purpose of this paper is to describe the development and validation of the CIAT STE.
AB - Presently, cyber defense heavily relies on human network analysts who must detect and investigate potential suspicious activity, a demanding, fatiguing process that takes a heavy toll on human operators. Given the criticality of these operators to cyber defense, research is needed to investigate and mitigate the sources of those challenges. Currently, few cyber-focused synthetic task environments (STEs) exist, and those that do are not well suited to investigate the problems of network analysts. Therefore, a new cyber STE focused on network analysts called the Air Force Cyber Intruder Alert Testbed (CIAT) was developed. This STE was designed to emulate key functions of Enterprise-level cyber defense platforms. Specifically, CIAT simulates a network analyst environment, including an intrusion detection system, signature database, packet capture software, and network list. The purpose of this paper is to describe the development and validation of the CIAT STE.
KW - Cyber defense
KW - IMPRINT
KW - Network analyst
KW - Synthetic task environment
UR - http://www.scopus.com/inward/record.url?scp=84986301140&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-41932-9_30
DO - 10.1007/978-3-319-41932-9_30
M3 - Conference contribution
AN - SCOPUS:84986301140
SN - 9783319419312
T3 - Advances in Intelligent Systems and Computing
SP - 363
EP - 376
BT - Advances in Human Factors in Cybersecurity - Proceedings of the AHFE International Conference on Human Factors in Cybersecurity, 2016
A2 - Nicholson, Denise
PB - Springer-Verlag
T2 - International Conference on Human Factors in Cybersecurity, 2016
Y2 - 27 July 2016 through 31 July 2016
ER -