Attacker Chatbots for Randomised and Interactive Security Labs, Using Secgen and Ovirt

Attacker Chatbots for Randomised and Interactive Security Labs, Using Secgen and Ovirt

View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Leeds Beckett Repository Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt Z. Cliffe Schreuders, Thomas Shaw, Aimée Mac Muireadhaigh, Paul Staniforth, Leeds Beckett University Abstract sheets, provision VMs, and provide randomisation Capture the flag (CTF) has been applied with success in between students. cybersecurity education, and works particularly well 2. Related Literature when learning offensive techniques. However, Capture the flag (CTF) is a type of cyber security game defensive security and incident response do not always which involves collecting flags by solving security naturally fit the existing approaches to CTF. We present challenges. CTF events give professionals, students, Hackerbot, a unique approach for teaching computer and enthusiasts an opportunity to test their security security: students interact with a malicious attacker skills in competition. CTFs emerged out of the chatbot, who challenges them to complete a variety of DEFCON hacker conference [7] and remain common security tasks, including defensive and investigatory activities at cybersecurity conferences and online [8]. challenges. Challenges are randomised using SecGen, Some events target students with the goal of and deployed onto an oVirt infrastructure. encouraging interest in the field: for example, PicoCTF Evaluation data included system performance, mixed is an annual high school competition [9], and CSAW methods questionnaires (including the Instructional CTF is an annual competition for students in Higher Materials Motivation Survey (IMMS) and the System Education (HE) [10]. Usability Scale (SUS)), and group interviews/focus Applications of CTF scenarios have demonstrated groups. Results were encouraging, finding the approach pedagogical utility when used within HE. Challenges convenient, engaging, fun, and interactive; while have been adapted and used successfully in CTF-style significantly decreasing the manual marking workload lab exercises [1], [2], [11], in class competitions [12] for staff. The cloud infrastructure deployment using and extra-curricular activities [4], [13]. SecGen/oVirt was a success, generating VMs with randomised challenges, and enabling students to work Prior work on the Security Scenario Generator from home. (SecGen) framework aimed to solve issues present when using static CTF challenges in assessment 1. Introduction situations [6], [14]. Hacking challenge scenarios are Computer security education benefits from hands-on expensive and time consuming to create [15]. CTF interactive learning activities. Capture the flag (CTF) challenges should not typically be reused in assessment has been applied with success in education [1]–[4], and situations, such as university assignments, competitions works particularly well when learning offensive or job recruitment, as solutions and discussion of the techniques. However, defensive security and incident challenges are commonly found online. SecGen response do not always naturally fit the existing generates random challenge content and unique flags approaches to CTF. Defensive and investigative tasks per participant, which enables the reusability of a can be effective when they are interactive, where there scenario within the same class of students whilst is a separate actor (such as a red team) working against limiting the potential for collusion [6], [14]. the learners [5]. Our aim was to create a new approach Gondree et al. [16] note the benefits of using automated via automation and interactive immersion that supports adversaries in computer security games. When defensive and investigative cybersecurity scenarios, compared with human competitors, automated enabling students to work at their own pace with an adversaries can have increased availability, can be interactive adversary. arbitrarily sophisticated and can be adapted to the level We developed a free and open source software (FOSS)1 of difficulty required based on the level of competition interactive chatbot, Hackerbot, which can be configured or educational context. to attack VMs; presenting a variety of security 3. Aims challenges, rewarding correct solutions with flags. We deployed an oVirt infrastructure to host the VMs, and Our aim was to create a new approach to cybersecurity leveraged the SecGen framework [6] to generate lab training that provides interactive immersion while supporting defensive and investigative security. We 1 Hackerbot is incorporated into the SecGen project, also aimed to create reusable randomised challenges available at https://github.com/cliffe/SecGen and scenarios that could be used for learning and management, migration, and display networks used a assessment purposes. Furthermore, we aimed to deploy 10Gb network. the lab challenges into a cloud-based infrastructure to Students accessed VMs via the oVirt user portal. support distance access to the lab environment. Finally, Students were granted permissions to create VMs using an underlying goal was to create an enjoyable and the many templates and ISOs we provided. VMs that usable experience for students, encouraging motivation students own could be started, stopped, snapshots to engage in the course. created, and could be configured onto various logical 4. Methods networks. From the user portal, console files could be A design science research approach was applied, by downloaded, which granted graphical/console access to designing a solution, followed by implementation and VMs via SPICE/VNC. it’s evaluation. Implementation included development 5.2. Accessing oVirt infrastructure remotely of a significant private cloud-based infrastructure, The user portal was available from university labs, and software development (including chatbots and was available remotely via VPN and RDP access. This websites), vulnerable systems and security challenges, enabled students to access VMs from home. and lab sheets. RDP access was added during the semester due to After the semester was complete, and all grades problems many students experienced with VPN returned, students were asked to complete a survey, and connections dropping. Accessing the infrastructure via participate in a semi-structured group interview. The RDP involved logging into the RDP server, which survey included questions related to the lab displayed the VMs on the remote desktop (via infrastructure, Hackerbot, flag-based chatbot SPICE/VNC), which was in turn displayed to students assessment structure and engagement, and any further over the RDP protocol connection. As a consequence, suggestions, and positive and negative comments. The students did not require any oVirt/SPICE/VNC specific Instructional Materials Motivation Survey (IMMS) was software installed. used to measure student engagement and motivation (based on the ARCS model of motivation: Attention, 5.3. Provisioning SecGen into an oVirt infrastructure Relevance, Confidence, and Satisfaction) [17], and the System Usability Scale (SUS) [18] was used to measure usability. The IMMS survey is made up of 36 Likert scale questions, which are used to calculate a score for student motivation. The SUS has 10 Likert scale questions, and produces a non-linear usability score out of 100. Both of these survey tools are well established and extensively validated in the literature. Qualitative feedback received via the survey was analysed using thematic analysis. Each comment was coded and then grouped into themes. 5. SecGen/oVirt Security Labs 5.1. oVirt Security Labs infrastructure Figure 1: SecGen creates a project, then Vagrant creates VMs using A pilot study was conducted to gather student feedback VirtualBox or oVirt, and provisions via Puppet regarding the interface and capabilities of oVirt for the purpose of cybersecurity education [19]. Based on this We extended SecGen [6] with the ability to provision pilot study we concluded that oVirt is a feasible VMs to oVirt. Previously SecGen only supported platform on which to build a lab environment for creating VirtualBox VMs. Extending SecGen to support teaching computer security. oVirt leveraged the use of an existing Vagrant plugin and a Ruby gem for oVirt. Templates for oVirt Consequently, we developed an oVirt infrastructure matching the Virtualbox base boxes were created. consisting of: a virtual data centre with 1 cluster and 3 Figure 1 illustrates, that SecGen now supports options hosts running oVirt node 4.1 (HPE Proliant DL360 Gen for creating project output that specifies whether 9 servers, with 2 sockets, 12 core, 2 threads per core to Vagrant should deploy to oVirt or VirtualBox. Briefly, give 48 Logical CPUs in each; 288GB of memory; SecGen reads its options (including credentials for 2x10Gb and 4x1Gb network sockets plus a 1Gb iLO oVirt), available modules (including vulnerabilities, connection); 3 storage domains hosted on a NFS cluster security network services, system utilities, and OS (with a Data Domain; ISO Domain and Export bases), reads the required scenario, performs Domain); the students VM networks used the 1Gb randomisation, and generates the project directory network connected to an isolated switch; the storage, output, which includes everything required for Vagrant to create the VMs and deploy Puppet to provision software and configuration changes. 5.4. Batch SecGen processing To enable us to provision VMs for entire classes of students, we created a new service to run on a server to provision from2. The batch_secgen.rb

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us