NPS logo Naval Postgraduate School
Dudley Knox Library
        View Item 
        •   Calhoun Home
        • Theses and Dissertations
        • 1. Thesis and Dissertation Collection, all items
        • View Item
        •   Calhoun Home
        • Theses and Dissertations
        • 1. Thesis and Dissertation Collection, all items
        • View Item
        • How to search in Calhoun
        • My Accounts
        • Ask a Librarian
        JavaScript is disabled for your browser. Some features of this site may not work without it.

        Browse

        All of CalhounCollectionsThis Collection

        My Account

        LoginRegister

        Statistics

        Most Popular ItemsStatistics by CountryMost Popular Authors

        Strategies used in capture-the-flag events contributing to team performance

        Thumbnail
        View/Open
        Icon16Mar_Yam_Jerel.pdf (1.038Mb)
        Download Record
        Download to EndNote/RefMan (RIS)
        Download to BibTex
        Author
        Yam, Wye Kede Jerel
        Date
        2016-03
        Advisor
        Eagle, Christopher
        Beverly, Robert
        Metadata
        Show full item record
        Abstract
        Capture-the-flag (CTF) exercises are useful pedagogical tools and have been employed, both formally and informally, by academic institutions. Much like their physical counterparts, cyber CTF exercises hold pedagogical value and are gaining wide popularity. Existing studies on CTF exercises examined either how they benefit learning, or are best conducted. To our knowledge, no formal study has yet looked at the relationship between the strategies and tactics that the CTF participants employ (as defined by their offensive and defensive tactics), and the performance of participants in these events. In this thesis, we studied network traffic and game state data from the DEFCON 22 CTF event. We developed tools to ex-tract features from large volumes of network data; we then correlated these features with game state data to piece together strategies that the participating teams seemingly employ. We learned that several teams employed effective tactics such as capturing their opponents' exploits from the network to reuse them, employing automation to help with launching their exploits, obfuscating their attacks and attack responses, and attacking the client hosts of other teams.
        Description
        Approved for public release; distribution is unlimited
        URI
        http://hdl.handle.net/10945/48498
        Collections
        • 1. Thesis and Dissertation Collection, all items
        • 2. NPS Outstanding Theses and Dissertations

        Related items

        Showing items related by title, author, creator and subject.

        • Thumbnail

          An implementation of traffic monitoring for UNIX network performance management. 

          Fu Chen-Hua (Monterey, California: Naval Postgraduate School, 1993-03);
          Efficient performance and high throughput are the major goals of the network performance management. How can we achieve these goal? First, it is necessary to know the network traffic situations. This thesis research ...
        • Thumbnail

          Homeland Security Affairs Journal, Volume II - 2006: Issue 2, July 

          Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);
          July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ...
        • Thumbnail

          Partial information community detection in a multilayer network 

          Warnke, Scott D. (Monterey, California: Naval Postgraduate School, 2016-06);
          Identifying communities in a dark network is a potentially difficult task. The nature of dark networks, and their characteristic of con-cealing connections within the network, makes community detection an enterprise based ...
        Feedback

        411 Dyer Rd. Bldg. 339
        Monterey, CA 93943

         

        circdesk@nps.edu
        (831) 656-2947
        DSN 756-2947

        Start Your Research

        • Research Guides
        • How to Cite
        • Search Basics
        • Ask a Librarian
        • Library Liaisons
        • Graduate Writing Center
        • Thesis Processing Office
        • Statistics, Maps & More
        • Copyright at NPS

        Find & Download

        • Databases List
        • Articles, Books & More
        • NPS Theses
        • NPS Faculty Publications: Calhoun
        • Journal Titles
        • Course Reserves

        Use the Library

        • My Accounts
        • Request Article or Book
        • Borrow, Renew, Return
        • Remote Access
        • Workshops & Tours
        • For Faculty & Researchers
        • For International Students
        • For Alumni
        • Print, Copy, Scan, Fax
        • Rooms & Study Spaces
        • Floor Map
        • Computers & Software
        • Adapters, Lockers & More

        Collections

        • NPS Archive: Calhoun
        • Restricted Resources
        • Special Collections & Archives
        • Federal Depository
        • Homeland Security Digital Library

        About

        • Hours
        • Library Staff
        • About Us
        • Visit Us

        NPS-Licensed Resources - Terms & Conditions

        Copyright Notice

         
         

        Facebook logo Federal Depository Library Program Emblem NPS Video Portal

        NPS Home Privacy Policy Copyright Accessibility Contact Webmaster