An Overview of Cyber Attack and Computer Network Operations Simulation

被引:0
|
作者
Leblanc, Sylvain P. [1 ]
Partington, Andrew [1 ]
Chapman, Ian [2 ]
Bernier, Melanie [2 ]
机构
[1] Royal Mil Coll Canada, Comp Secur Lab, Kingston, ON, Canada
[2] Def Res & Dev Canada, Ctr Operat Res & Anal, Ottawa, ON, Canada
关键词
Overview; Survey Paper; Cyber Attacks; Cyber Warfare; Computer Network Operations;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper represents a snapshot of the current state of the art in the simulation and modeling of cyber attacks and defensive responses to those. It discusses a number of simulations of cyber warfare, including live, virtual, and constructive simulations. The simulations discussed in this paper were found in the open literature and were conducted in the private sector, academia, and government. Each simulation is briefly described, including goals, methodology, and a brief discussion of its accomplishments. These modeling and simulation efforts are of particular interest to the military modeling and simulation community, as it is likely that military forces will continue to rely ever more heavily on computer and communication networks.
引用
收藏
页码:92 / 100
页数:9
相关论文
共 50 条
  • [1] Network security modeling and cyber attack simulation methodology
    Chi, SD
    Park, JS
    Jung, KC
    Lee, JS
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 320 - 333
  • [2] Cyber attack modeling and simulation for network security analysis
    Kuhl, Michael E.
    Kistner, Jason
    Costantini, Kevin
    Sudit, Moises
    PROCEEDINGS OF THE 2007 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2007, : 1159 - +
  • [3] Simulation for training computer network operations
    DeLooze, LL
    McKean, P
    Mostow, JR
    Graig, C
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 329 - 334
  • [4] Attribution Across Cyber Attack Types: Network Intrusions and Information Operations
    Goel, Sanjay
    Nussbaum, Brian
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 1082 - 1093
  • [5] Simulation Approach for Military Cyber Operations
    Morton, Ben
    Leblanc, Sylvain
    Bernier, Melanie
    PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 180 - 187
  • [6] An Overview of Cyber-Attack Vectors on SCADA Systems
    Irmak, Erdal
    Erkek, Ismail
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
  • [7] Cyber-Attack Modeling Analysis Techniques: An Overview
    AL-Mohannadi, Hamad
    Mirza, Qublai
    Namanya, Anitta
    Awan, Irfan
    Cullen, Andrea
    Disso, Jules
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 69 - 76
  • [8] AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis
    Shandilya, Shishir Kumar
    Upadhyay, Saket
    Kumar, Ajit
    Nagar, Atulya K.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 127 : 297 - 308
  • [9] Cyber-attack and defense simulation framework
    Bergin, Dennis Lee
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 383 - 392
  • [10] Simulation of a RTU Cyber Attack on a Transformer Bank
    Top, Philip
    Banks, Eddy
    Barnes, Peter D., Jr.
    Bromberger, Seth
    Kelley, Brian M.
    Soto, Rafael Rivera
    Salazar, Benjamin
    Smith, Steven G.
    Yee, Nathan
    Freund, Mark
    2017 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, 2017,