{"id":13542,"date":"2022-01-26T11:44:25","date_gmt":"2022-01-26T10:44:25","guid":{"rendered":"https:\/\/nr.no\/en\/?post_type=bc_project&#038;p=13542"},"modified":"2025-08-25T14:00:35","modified_gmt":"2025-08-25T12:00:35","slug":"ai-based-scenario-management-for-cyber-range-training","status":"publish","type":"bc_project","link":"https:\/\/nr.no\/en\/projects\/ai-based-scenario-management-for-cyber-range-training\/","title":{"rendered":"AI-based scenario management for cyber range training (ASCERT)"},"content":{"rendered":"\n<p class=\"has-sizing-medium\"><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-sizing-large\"><strong>Society is facing a precarious shortage of cybersecurity professionals and the gap between the demand and the availability of qualified labour is widening. <\/strong><\/p>\n\n\n\n<p><strong>ASCERT supports both the private and public sector by offering training and professional development in cybersecurity, with a particular focus on practical crisis management exercises.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/nr.no\/content\/uploads\/sites\/2\/2022\/01\/josue-valencia-unsplash-1024x683.jpg\" alt=\"The image shows an open laptop in a dark room. The light from the computer shines on a white surface.\" class=\"wp-image-13564\" style=\"width:980px\" srcset=\"https:\/\/nr.no\/content\/uploads\/sites\/2\/2022\/01\/josue-valencia-unsplash-1024x683.jpg 1024w, https:\/\/nr.no\/content\/uploads\/sites\/2\/2022\/01\/josue-valencia-unsplash-300x200.jpg 300w, https:\/\/nr.no\/content\/uploads\/sites\/2\/2022\/01\/josue-valencia-unsplash-768x512.jpg 768w, https:\/\/nr.no\/content\/uploads\/sites\/2\/2022\/01\/josue-valencia-unsplash-1536x1024.jpg 1536w, https:\/\/nr.no\/content\/uploads\/sites\/2\/2022\/01\/josue-valencia-unsplash-scaled.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Effective cybersecurity exercises depend on careful planning, execution, and evaluation. ASCERT develops tools and methods to support the whole process..<\/em> Image: Josue Valencia \/ Unsplash.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">A growing shortage of cybersecurity expertise<\/h2>\n\n\n\n<p>A recent report by the Nordic Institute for Studies in Innovation, Research and Education (NIFU), prepared on behalf of the Ministry of Justice and Public Security, titled <em>\u201cThe Labour Market\u2019s Need for Digital Security Competence Towards 2030,\u201d<\/em> shows that Norway will continue to face a significant shortage of digital security expertise in the years ahead.<\/p>\n\n\n\n<p>Even though educational reach in digital security has expanded, there is growing demand the labour market for these skills.  The sharp increase in cyberattacks fuels intense competition, frequently depleting the labour market of expertise. and often leaves the market depleted of expertise.<\/p>\n\n\n\t<div class=\"nr-spacer nr-spacer-small wp-block-nr-spacer\">\n\t<\/div>\n\t\n\n\n<h2 class=\"wp-block-heading\">Practical training for efficient crisis management<\/h2>\n\n\n\n<p>To address this challenge, systematic opportunities for continuing education and professional development in both the private and public sector is key. This involves not only theoretical training, but also practical exercises in crisis management.<\/p>\n\n\n\n<p>Employees need to develop applicable skills in handling complex and unpredictable incidents in cybersecurity, improve collaboration across organisational levels, and strengthen their ability to respond quickly and in a coordinated manner when security breaches occur.<\/p>\n\n\n\n<p>Planning and conducting realistic exercises requires considerable time, resources, and expertise. These investments are weakened by the fact that there are few reliable methods for measuring participants\u2019 learning and skills development over time, which makes it difficult to assess the actual learning outcomes and adapt training in a targeted way.<\/p>\n\n\n\t<div class=\"nr-spacer nr-spacer-small wp-block-nr-spacer\">\n\t<\/div>\n\t\n\n\n<h2 class=\"wp-block-heading\">The ASCERT project <\/h2>\n\n\n\n<p>In the ASCERT project, we are developing tools and methods to make it easier to plan, conduct, and evaluate cybersecurity exercises.<\/p>\n\n\n\n<p>By combining artificial intelligence, learning theory, and co-creation, the project aims to establish a holistic workflow for the design, execution, and evaluation of such exercises.<\/p>\n\n\n\n<p class=\"has-sizing-medium\"><\/p>\n\n\n\n<p class=\"has-sizing-medium\"><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h3 class=\"wp-block-heading\">To learn more about this project, please contact:<\/h3>\n\n\n\t\t<div id=\"post-type-multi-block_570c8196b7038c803af90cde11b1f4cb\" class=\"wp-block-post-type-multi type-manual style-card-bc_employee t2-grid\">\n\t\t\t\t\t\t\t<div class=\"t2-grid-item-col-12\">\n\t\t\t\t\t\t<a href=\"https:\/\/nr.no\/en\/employees\/sinan-s-tanilkan\/\" class='card-employee'>\n\t\t\t\t\t<figure>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/nr.no\/content\/uploads\/sites\/2\/2024\/05\/sinan-s-tanilkan-12.jpg\" alt=\"\">\n\t\t\t<\/figure>\n\t\t\t\t<div class=\"card-employee__content\">\n\t\t\t<p class=\"card-employee__name\">Sinan S. Tanilkan<\/p>\n\t\t\t\t\t\t\t<p class=\"card-employee__position\">Senior Research Scientist<\/p>\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon t2-icon-arrowforward\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.9 4.259a1.438 1.438 0 0 1-.147.037c-.139.031-.339.201-.421.359-.084.161-.084.529-.001.685.035.066 1.361 1.416 2.947 3l2.882 2.88-10.19.02c-8.543.017-10.206.029-10.29.075-.282.155-.413.372-.413.685 0 .313.131.53.413.685.084.046 1.747.058 10.29.075l10.19.02-2.882 2.88c-1.586 1.584-2.912 2.934-2.947 3-.077.145-.085.521-.013.66a.849.849 0 0 0 .342.35c.156.082.526.081.68-.001.066-.035 1.735-1.681 3.709-3.656 2.526-2.53 3.606-3.637 3.65-3.742A.892.892 0 0 0 23.76 12a.892.892 0 0 0-.061-.271c-.044-.105-1.124-1.212-3.65-3.742-1.974-1.975-3.634-3.616-3.689-3.645-.105-.055-.392-.107-.46-.083\"\/><\/svg>\n\t\t<\/div>\n\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\n<div class=\"wp-block-group has-nr-dark-yellow-background-color has-background\">\n<p class=\"has-sizing-medium\">Project: ASCERT<\/p>\n\n\n\n<p class=\"has-sizing-medium\">Partners: The Norwegian Offshore Directorate, Levato, EcoOnline, NTNU Cyber Range<\/p>\n\n\n\n<p class=\"has-sizing-medium\">Funding: The Research Council of Norway <\/p>\n\n\n\n<p>Period: 2021 &#8211; 2025<\/p>\n<\/div>\n\n\n\t<div class=\"nr-spacer nr-spacer-small wp-block-nr-spacer\">\n\t<\/div>\n\t\n\n\n<div class=\"wp-block-group has-background\" style=\"background-color:#d2f3f1\">\n<p><strong>Further resources:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/prosjektbanken.forskningsradet.no\/en\/project\/FORISS\/329062?Kilde=FORISS&amp;distribution=Ar&amp;chart=bar&amp;calcType=funding&amp;Sprak=no&amp;sortBy=score&amp;sortOrder=desc&amp;resultCount=30&amp;offset=0&amp;Fritekst=329062\" target=\"_blank\" rel=\"noreferrer noopener\">Project Bank<\/a> (external link)<\/p>\n<\/div>\n\n\n\t<div class=\"nr-spacer nr-spacer-small wp-block-nr-spacer\">\n\t<\/div>\n\t\n\n\n<div class=\"wp-block-group\">\n<p><strong>Publications<\/strong>:<\/p>\n\n\n\n<div class=\"wp-block-group\">\n<p>Balto, K. E., M. M. Yamin, A. Shalaginov, and B. Katt, &#8220;Hybrid IoT Cyber Range,&#8221; <em>Sensors<\/em>, vol. 23, no. 6, p. 3071, 2023.<\/p>\n\n\n\n<p>F\u00e6r\u00f8y, F. L., M. M. Yamin, A. Shukla, and B. Katt, &#8220;Automatic Verification and Execution of Cyber Attack on IoT Devices,&#8221; <em>Sensors<\/em>, vol. 23, no. 2, p. 733, 2023.<\/p>\n\n\n\n<p>Hannay, J. E., A. Stolpe, and M. M. Yamin, &#8220;Toward AI-based scenario management for cyber range training,&#8221; in <em>HCI International 2021 \u2013 Late Breaking Papers: Multimodality, eXtended Reality, and Artificial Intelligence<\/em> (Lecture Notes in Computer Science), 23rd HCI International Conference, HCII 2021, Virtual Event, July 24\u201329, 2021. Cham: Springer International Publishing, 2021.<\/p>\n\n\n\n<p>Shukla, A., B. Katt, and M. M. Yamin, &#8220;A quantitative framework for security assurance evaluation and selection of cloud services: a case study,&#8221; <em>International Journal of Information Security<\/em>, pp. 1-30, 2023.<\/p>\n\n\n\n<p>Stolpe, A., I. Rummelhoff, and J. E. Hannay, &#8220;A logic-based event controller for means-end reasoning in simulation environments,&#8221; <em>SIMULATION<\/em>, vol. 99, no. 8, pp. 831-858, 2023.<\/p>\n\n\n\n<p>Yamin, M. M., E. Hashmi, M. Ullah, and B. Katt, &#8220;Applications of LLMs for Generating Cyber Security Exercise Scenarios,&#8221; <em>IEEE Access<\/em>, vol. 12, pp. 143806-143822, 2024.<\/p>\n\n\n\n<p>Yamin, M. M., E. Hashmi, and B. Katt, &#8220;Combining Uncensored and Censored LLMs for Ransomware Generation,&#8221; in <em>Web Information Systems Engineering \u2013 WISE 2024<\/em> (Lecture Notes in Computer Science, vol. 15439), M. Barhamgi, H. Wang, and X. Wang, Eds. Singapore: Springer, 2025.<\/p>\n\n\n\n<p>Yamin, M. M., S. F. Wen, and B. Katt, &#8220;AI-Assisted Assurance Profile Creation for System Security Assurance,&#8221; in <em>Computer Security. ESORICS 2024 International Workshops<\/em> (Lecture Notes in Computer Science, vol. 15264), J. Garcia-Alfaro <em>et al.<\/em>, Eds. Cham: Springer, 2025.<\/p>\n\n\n\n<p>Yamin, M. M., A. S. Imran, and B. Katt, &#8220;Towards a Digital Twin for Lifelong Learning,&#8221; in <em>Proc. 2023 4th Int. Conf. Computing, Mathematics and Engineering Technologies (iCoMET)<\/em>. IEEE, 2023.<\/p>\n\n\n\n<p>Yamin, M. M., <em>et al.<\/em>, &#8220;ADAPT \u2013 Automated Defence TrAining PlaTform in a Cyber Range,&#8221; in <em>Proc. Int. Conf. Information Systems and Management Science<\/em>. Cham: Springer International Publishing, 2022. <\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"featured_media":9164,"template":"","meta":{"_acf_changed":false,"_trash_the_other_posts":false,"editor_notices":[],"footnotes":""},"class_list":["post-13542","bc_project","type-bc_project","status-publish","has-post-thumbnail"],"acf":[],"_links":{"self":[{"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/bc_project\/13542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/bc_project"}],"about":[{"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/types\/bc_project"}],"version-history":[{"count":5,"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/bc_project\/13542\/revisions"}],"predecessor-version":[{"id":35462,"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/bc_project\/13542\/revisions\/35462"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/media\/9164"}],"wp:attachment":[{"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/media?parent=13542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}