Loading...

CSR CRST 2021

2021 IEEE CSR Workshop on Cyber Ranges and Security Training (CRST)


Cyber-attacks are increasing in both sophistication and scale, revealing the extent at which critical infrastructures and other information and communication systems are exposed. More highly skilled cyber security professionals are needed with a deep understanding of cyber-security to deal with the fast growing number of cyber-threats. Cyber-security education and training are becoming more and more relevant as it is the only way in which such incidents can be prevented and handled adequately. A cyber-range (CR) is the environment in which cyber-security experts and professionals can practice technical and soft skills and be trained —in an isolated virtual environment emulating large-scale complex networks— on how to respond to cyber-attack scenarios within various domains. The more realistic the simulated scenarios, the more prepared the trainees will be to face real-world attacks.

The cyber-space offered by the CR infrastructure recreates the experience of responding to a cyber-attack, by replicating a security operations center environment, an organization’s network and the attack itself. CRs are considered to be the key towards strengthening the robustness and security of critical infrastructures; therefore, it is important that they provide a realistic, diverse, and dynamic simulation environment so as to properly prepare trainees for preventing and responding to all incidents of cyber-attacks. This is an area in which further advancements should be made: the generated scenarios are tightly coupled with the domain being modelled, often not easily modifiable to accommodate changes in an organization’s infrastructure or software and likewise not easily extendable to acquire knowledge regarding newly discovered vulnerabilities, threats and attackers’ tactics, techniques, and procedures. In the era of IoT, these limitations do not allow easy prevention, detection, and mitigation of hybrid attacks spanning many different domains.

This workshop focuses on both research and practical aspects of cyber ranges and aims at addressing the main challenges involved in their development and use in professional cyber security training, as well as in exploring the use of emerging technologies. Aligned with the interdisciplinary nature of cyber security, authors from academia, industry, and government are welcome to contribute.

Topics of Interest

Prospective authors are encouraged to submit previously unpublished contributions from a broad range of topics, which include but are not limited to the following:

› Cyber range integration and federation
› Emulation and simulation techniques (exercises, architecture, etc.)
› Hybrid system integration
› Emerging technologies in cyber ranges
› Econometric models in cyber security training

› Risk assessment frameworks for training
› Trainee evaluation and situational awareness
› Learning methods in cyber security training certifications
› Serious gaming and visualization
› Cyber-exercises and strategic decision making

Important Dates

Paper submission deadline: April 19 May 10, 2021 AoE (firm)
Authors’ notification: May 3 May 31, 2021 AoE
Camera-ready submission: May 10 June 7, 2021 AoE
Early registration deadline: June 14, 2021 AoE
Workshop date: July 26, 2021

Submission Guidelines

The workshop’s proceedings will be published by IEEE and will be included in IEEE Xplore. The guidelines for authors, manuscript preparation guidelines, and policies of the IEEE CSR conference are applicable to CRST 2021 workshop. Please visit the authors’ instructions page for more details. When submitting your manuscript via the conference management system, please make sure that the workshop’s track 2T2 CRST is selected in the Topic Areas drop down list.

Workshop Committees

Workshop chairs

Xavier Bellekens, University of Strathclyde Glasgow (UK)
Dimitrios Kavallieros, Center for Security Studies (GR)
Neofytos Gerosavva, Eight Bells (CY)
Angelos Amditis, Institute of Communication and Computer Systems (GR)

Organizing committee

Xavier Bellekens, University of Strathclyde Glasgow (UK)
Neofytos Gerosavva, Eight Bells (CY)
Sotiris Ioannidis, Technical University of Crete (GR)
Dimitrios Kavallieros, Center for Security Studies (GR)
Tero Kokkonen, JAMK University of Applied Sciences (FI)
Eleftherios Ouzounoglou, Institute of Communication and Computer Systems (GR)
Egidija Versinskiene, Lithuanian Cybercrime Center of Excellence for Training, Research & Education (LT)

Publicity chair

Damir Haskovic, Damir Haskovic, Minds & Sparks GmbH (AT)

Contact us

xavier.bellekens@strath.ac.uk
d.kavallieros@kemea-research.gr
neofytos.gerosavva@8bellsresearch.com
a.amditis@iccs.gr

Program committee

Thibaud Antignac, French Alternative Energies and Atomic Energy Commission (FR)
Manos Athanatos, Foundation for Research and Technology – Hellas (GR)
Vasiliki-Georgia Bilali, Center for Security Studies (GR)
Chiara Braghin, University of Milan (IT)
Evaldas Bruze, Lithuanian Cybercrime Center of Excellence (LT)
Evangelos Chaskos, University of Peloponnese (GR)
Cristina-Emilia Costa, Fondazione Bruno Kessler (IT)
Eleni Darra, Center for Security Studies (GR)
Eleni-Constantina Davri, Center for Security Studies (GR)
Giorgio Di Tizio, University of Trento (IT)
George Fekkas, Institute of Communication and Computer Systems (GR)
Fulvio Frati, University of Milan (IT)
Konstantinos Fysarakis, Sphynx Technology Solutions AG (CH)
Jan Hajny, BRNO University of Technology (CZ)
George Hatzivasilis, Hellenic Mediterranean University (GR)
Paijanen Jani, JAMK University of Applied Sciences (FI)
Augustin Lemesle, French Alternative Energies and Atomic Energy Commission (FR)
Diego R Lopez, Telefonica I+D (ES)
Evangelos Markatos, Foundation for Research and Technology – Hellas (GR)
Vaclav Matyas, Masaryk University (CZ)
Matteo Merialdo, RHEA Group (BE)
Raul Orduna Urrutia, Vicomtech (ES)
Constantinos Patsakis, University of Piraeus (GR)
George Tsakirakis, Information Technology for Market Leadership (GR)
Algimantas Venckauskas, Kaunas University of Technology (LT)

Supported by

Program Information

Cyber security certification programmes
E.-C. Davri, E. Darra, I. Monogioudis, A. Grigoriadis, C. Iliou, N. Mengidis, T. Tsikrika, S. Vrochidis, A. Peratikou, H. Gibson, D. Haskovic, D. Kavallieros, E. Chaskos, P. Zhao, S. Shiaeles, N. Savage, B. Akhgar, X. Bellekens, and M. Amine Ben Farah

ECHO federated cyber range: Towards next-generation scalable cyber ranges
N. Oikonomou, N. Mengidis, M. Spanopoulos – Karalexidis, A. Voulgaridis, M. Merialdo, I. Raisr, K. Hanson, P. de La Vallee, T. Tsikrika, S. Vrochidis, and K. Votis

Frankenstack: Real-time cyberattack detection and feedback system for technical cyber exercises
M. Pihelgas and M. Kont

The current SOTA and future of European cyber range ecosystem
C. Virag, T. Lieskovan, J. Čegan, and M. Merialdo

The Cyber-MAR project: First results and perspectives on the use of hybrid cyber ranges for port cyber risk assessment
O. Jacq, P. Giménez Salar, K. Parasuraman, J. Kuusijärvi, A. Gkaniatsou, E. Latsa, and A. Amditis

The SPIDER cyber security investment component (CIC)
M. Tsiodra, M. Chronopoulos, M. Ghering, E. Karapistoli, N. Gerosavva, and N. Kylilis

The THREAT-ARREST cyber ranges platform
G. Hatzivasilis, S. Ioannidis, M. Smyrlis, G. Spanoudakis, F. Frati, C. Braghin, E. Damiani, H. Koshutanski, G. Tsakirakis, T. Hildebrandt, L. Goeke, S. Pape, O. Blinder, M. Vinov, G. Leftheriotis, M. Kunc, F. Oikonomou, G. Magilo, V. Petrarolo, A. Chieti, and R. Bordianu

See also the conference’s overall list of accepted papers.

Coming soon.

See also the conference’s overall program.