Online cybersecurity competitions have gained significant traction in the community for educational and evaluative purposes because they offer dynamic environments for learning intricate technical concepts in an engaging, non-traditional, and interactive manner. While such competitions are increasingly popular and frequently held, organizing them is not straightforward. Developers must design challenges that are both innovative and balanced in difficulty, ensuring an enjoyable learning experience. Concurrently, effective hosting, configuring, and managing the online infrastructure that underpins these games are technical challenges demanding informed decisions. Unfortunately, no comprehensive resource exists to guide organizers in choosing suitable hosting architecture and tools based on their technical proficiency and event scale. This paper contributes to addressing this gap by examining prevalent architectures for hosting Capture The Flag (CTF) competitions and evaluating them using criteria encompassing several factors. These factors include environment setup, deployment, configuration, and updates of vulnerable services, system maintenance, and security mechanisms. Each criterion is qualitatively assessed with an associated numeric score. Finally, the paper puts forward recommendations on architecture and tools based on event size and organizer skills.

A Comparison of Hosting Techniques for Online Cybersecurity Competitions

Maggioni N.
;
Galletta L.
2024-01-01

Abstract

Online cybersecurity competitions have gained significant traction in the community for educational and evaluative purposes because they offer dynamic environments for learning intricate technical concepts in an engaging, non-traditional, and interactive manner. While such competitions are increasingly popular and frequently held, organizing them is not straightforward. Developers must design challenges that are both innovative and balanced in difficulty, ensuring an enjoyable learning experience. Concurrently, effective hosting, configuring, and managing the online infrastructure that underpins these games are technical challenges demanding informed decisions. Unfortunately, no comprehensive resource exists to guide organizers in choosing suitable hosting architecture and tools based on their technical proficiency and event scale. This paper contributes to addressing this gap by examining prevalent architectures for hosting Capture The Flag (CTF) competitions and evaluating them using criteria encompassing several factors. These factors include environment setup, deployment, configuration, and updates of vulnerable services, system maintenance, and security mechanisms. Each criterion is qualitatively assessed with an associated numeric score. Finally, the paper puts forward recommendations on architecture and tools based on event size and organizer skills.
2024
9783031557217
9783031557224
Capture the Flag
Cybersecurity games
Hosting architectures
Hosting recommendations
Jeopardy CTF competitions
File in questo prodotto:
File Dimensione Formato  
CTF_paper.pdf

accesso aperto

Tipologia: Documento in Pre-print
Licenza: Creative commons
Dimensione 320.35 kB
Formato Adobe PDF
320.35 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.11771/31878
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
social impact