DocumentCode :
3587463
Title :
Framework for evaluating Capture the Flag (CTF) security competitions
Author :
Raman, Raghu ; Sunny, Sherin ; Pavithran, Vipin ; Achuthan, Krishnasree
Author_Institution :
Center for Res. in Adv. Technol. for Educ., Amrita Univ., India
fYear :
2014
Firstpage :
1
Lastpage :
5
Abstract :
A large number of ethical hacking competitions are organized worldwide as Capture The Flag (CTF) events. But there does not exist a framework to evaluate and rank CTFs that will guide participants as to which CTF´s to participate. In a CTF event, the participants are required to either solve a set of challenges to gain points or they are required to defend their system by eliminating the vulnerabilities while attacking other´s system vulnerabilities. We are proposing a framework that would evaluate and rank CTFs according to factors like similarity of the tasks to the common critical vulnerabilities, solvability of tasks, periodicity, training given prior to CTF, geographical reach, problem solving skills etc. In the next step these factors are systematically assigned weights using Analytic Hierarchy Process. As part of frame work creation and validation, ten CTFs have been analysed. Our analysis indicates that: All CTFs fall in to one of the three categories (jeopardy, attack-defence and mixed); CTFs often adopt popular software vulnerabilities and threats as tasks to be solved; Only few CTFs give formal training prior to the event; Complexity of the tasks to be solved varies from CTF to CTF. Five CTFs were ranked using the newly developed framework.
Keywords :
analytic hierarchy process; computer crime; software engineering; CTF; analytic hierarchy process; capture the flag security evaluation; ethical hacking competitions; software vulnerabilities; Analytic hierarchy process; Computer crime; Training; Uniform resource locators; Analytic Hierarchy Process; CTF; Framework; Hacking; Vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Convergence of Technology (I2CT), 2014 International Conference for
Print_ISBN :
978-1-4799-3758-5
Type :
conf
DOI :
10.1109/I2CT.2014.7092098
Filename :
7092098
Link To Document :
بازگشت