ReSCIND Data Sets (2)

 

 

ReSCIND Logo 373x278

The human subjects research (HSR) studies performed under ReSCIND have amassed a wealth of data including cyber and human psychological data, under differing conditions to measure and record cognitive vulnerabilities and human cyber behavior.

CIRCE

 Prime

 Subs

 

 

 

 

 

 

 

Loss Aversion—Endowment Effect

  • Cognitive and cyber skills surveys, plus two 1-hour cyber tasks
  • 34 participants on cyber task with threatened loss of resources
  • Surveys and skills data; cyber activity, Splunk logs and session data
  • Link to dataset
  • Link to Data Set Cover Sheet

 Representativeness—Base Rate Neglect

  • Cognitive and cyber skills surveys, plus two 1-hour cyber tasks
  • 34 participants on cyber task with out-of-place vulnerabilities
  • Surveys and skills data; cyber activity, Splunk logs, and session data
  • Link to dataset
  • Link to Data Set Cover Sheet

 Confirmation Bias

 

Anchoring Bias

 Asymmetric Dominance


CASPAR

 Prime

 Subs

   
   
 
 

Silver Tier Game “Funfair”   

  • 1-hour series of funfair-themed games to measure cognitive effects such as risky choice and near miss effect that align with cyber tasks in “Gold” exercise
  • Online undergraduate students and cyber experts
  • Skills test, general (non-cyber) behavioral data
  • Link to dataset
  • Link to Data Set Cover Sheet

Gold Tier Cyber Exercise

  • 2-6 hour open CTF with sequenced tasks
  • Online undergraduate students and cyber experts who passed a cyber skills test. Partially overlaps with Silver tier “Funfair” participants
  • Docker and system logs, task tracking, Falco logs, PCAP, Snort & Suricata, and task metrics
  • Link to dataset
  • Link to Data Set Cover Sheet

PsyCCDef

 Prime

 Subs

   
     
 

Narrative: General Cyber CogVuln Study

  • Evaluated 17+ CogVulns found via established methods in independent, localized cyber decisions (cyber isomorphs)
  • 420 participants who passed a cyber knowledge screener
  • Psychometric data, questionnaires, timing, and self-reports
  • Link to dataset
  • Link to Data Set Cover Sheet
 

Narrative: Situated Cyber CogVuln Study

  • Evaluated Multiple CogVulns in decision points situated within 6 cyber narratives following a cyber attack chain
  • 111 cyber expert participants who passed a knowledge screener
  • Psychometric data, questionnaires, timing, and self-reports
  • Link to dataset
  • Link to Data Set Cover Sheet
 

Narrative: On-Range Cyber Attack CogVuln Exercise


GAMBiT
 Prime  Subs
     iscInstituteForCreativeTechnologies nothwesternUniversity  nYU 
 Naturalistic Cyber Attack Behavior with Host/Network Manipulations
  • 2-day cyber exercise attacking a single network with multiple key objectives and intermittent intelligence about the task
  • Host/Network Manipulations include realistic but potentially erroneous information such as mislabeled host names, applications, accounts, or files containing outdated credentials
  • 19 red team participants who passed a cyber screening questionnaire
  • Screening and demographics, self-reports and psychometric data, PCAP, Suricata, keylog, and terminal histories 

 Naturalistic Cyber Attack Behavior

  •  2-day cyber exercise attacking a single network with multiple key objectives and intermittent intelligence about the task
  • 20 red team participants who passed a cyber screening questionnaire
  • Screening and demographics, self-reports and psychometric data, PCAP, Suricata, keylog, and terminal histories

 Naturalistic Cyber Attack Behavior with Host/Network Network Manipulations

  •  2-day cyber exercise attacking a single network with multiple key objectives and intermittent intelligence about the task
  • Host/Network Manipulations include realistic but potentially erroneous information such as mislabeled host names, applications, accounts, or files containing outdated credentials
  • 22 red team participants who passed a cyber screening questionnaire
  • Screening and demographics, self-reports and psychometric data, PCAP, Suricata, keylog, and terminal histories

ASCEND

 Prime

Subs

   
       
       
 

SaikoCTF: In-Person HITBSec Conference

  • 2.5-hours CTF event with six challenges designed to elicit selected CogVulns
  • Cyber conference attendees at Hack in The Box Security (HITBSec) Conference in Thailand
  • Cyber data, physiological data, CogVuln & individual difference measures survey data
  • Link to dataset
  • Link to Data Set Cover Sheet

SaikoCTF: In-Person ECSC Conference

  • 2.5-hours CTF event with six challenges designed to elicit selected CogVulns
  • Cyber conference attendees at European Cybersecurity Challenge (ECSC) Conference in Italy
  • Cyber data, physiological data, CogVuln & individual difference measures survey data
  • Link to dataset
  • Link to Data Set Cover Sheet

SaikoCTF: In-Person EkoParty Conference

  • 2.5-hours CTF event with six challenges designed to elicit selected CogVulns
  • Cyber conference attendees at EkoParty Security Conference in Argentina
  • Cyber data, physiological data, CogVuln & individual difference measures survey data
  • Link to dataset (pending)
  • Link to Data Set Cover Sheet

SaikoCTF: In-Person Lab Cyber Exercise – Warfare Technicians

  • 6-hour CTF event with ten challenges designed to elicit selected CogVulns
  • Cyber Warfare Technicians U.S. Navy Information Warfare Center Corry Station
  • Cyber data, Cognitive Task Analysis data, CogVuln & individual difference measures survey data
  • Currently In Progress
  • Link to dataset
  • Link to Data Set Cover Sheet
 

SaikoCTF: In-Person Lab Cyber Exercise – Cyber Students

  • 6-hour CTF event with ten challenges designed to elicit selected CogVulns
  • Cybersecurity Students, University of West Florida
  • Cyber data, physiological data, CogVuln & individual difference measures survey data
  • Currently In Progress
  • Link to dataset (pending)
  • Link to Data Set Cover Sheet

SaikoCTF: Online Game "clubs"

  • 11-hour CTF event with ten challenges designed to elicit selected CogVulns
  • CTF players recruited worldwide online
  • Cyber data, CogVuln & individual difference measures survey data
  • Link to dataset
  • Link to Data Set Cover Sheet
 

SaikoCTF: Online Game “pwn”

  • 11-hour CTF event with ten challenges designed to elicit selected CogVulns
  • CTF players recruited worldwide online
  • Cyber data, CogVuln & individual difference measures survey data
  • Link to dataset
  • Link to Data Set Cover Sheet
  

SaikoCTF: Online Game “wicked6”

  • 11-hour CTF event with ten challenges designed to elicit selected CogVulns
  • Attendees of the online Wicked6 Cyber Games Virtual Global Hack & Chat Event
  • Cyber data, CogVuln & individual difference measures survey data
  • Link to dataset
  • Link to Data Set Cover Sheet
 

SaikoCTF: Online Game “mayday”

  • 11-hour CTF event with ten challenges designed to elicit selected CogVulns
  • CTF players recruited worldwide online
  • Cyber data, CogVuln & individual difference measures survey data
  • Currently in progress
  • Link to dataset
  • Link to Data Set Cover Sheet
  

Multi-Country Heuristics Online Study

  • CogVulns and individual difference questionnaires and surveys to measure the magnitude of cognitive effects and individual differences across geographically distributed populations
  • Over 1,200 participants from 30 countries worldwide
  • Big Five, GRiPS, ABC, CRT-3, ADMC, Overclaiming, other surveys, and self-reports
  • Link to dataset
  • Link to Data Set Cover Sheet