An Overview of Cyber Attack and Computer Network Operations Simulation

被引:0
|
作者
Leblanc, Sylvain P. [1 ]
Partington, Andrew [1 ]
Chapman, Ian [2 ]
Bernier, Melanie [2 ]
机构
[1] Royal Mil Coll Canada, Comp Secur Lab, Kingston, ON, Canada
[2] Def Res & Dev Canada, Ctr Operat Res & Anal, Ottawa, ON, Canada
关键词
Overview; Survey Paper; Cyber Attacks; Cyber Warfare; Computer Network Operations;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper represents a snapshot of the current state of the art in the simulation and modeling of cyber attacks and defensive responses to those. It discusses a number of simulations of cyber warfare, including live, virtual, and constructive simulations. The simulations discussed in this paper were found in the open literature and were conducted in the private sector, academia, and government. Each simulation is briefly described, including goals, methodology, and a brief discussion of its accomplishments. These modeling and simulation efforts are of particular interest to the military modeling and simulation community, as it is likely that military forces will continue to rely ever more heavily on computer and communication networks.
引用
收藏
页码:92 / 100
页数:9
相关论文
共 50 条
  • [21] GridAttackSim: A Cyber Attack Simulation Framework for Smart Grids
    Le, Tan Duy
    Anwar, Adnan
    Loke, Seng W.
    Beuran, Razvan
    Tan, Yasuo
    ELECTRONICS, 2020, 9 (08) : 1 - 21
  • [22] Risk Analysis of Cyber Physical Distribution Network Operation Considering Cyber Attack
    An Y.
    Liu D.
    Chen F.
    Xu W.
    Dianwang Jishu/Power System Technology, 2019, 43 (07): : 2345 - 2352
  • [23] Predictive model for multistage cyber-attack simulation
    Ravdeep Kour
    Adithya Thaduri
    Ramin Karim
    International Journal of System Assurance Engineering and Management, 2020, 11 : 600 - 613
  • [24] Cyber Attack Detection with Encrypted Network Connection Analysis
    Gonen, Serkan
    Karacayilmaz, Gokce
    Artuner, Harun
    Bariskan, Mehmet Ali
    Yilmaz, Ercan Nurcan
    Lecture Notes in Mechanical Engineering, 2024, : 622 - 629
  • [25] An Ontological Knowledge Base for Cyber Network Attack Planning
    Chan, Peter
    Theron, Jacques
    van Heerden, Renier
    Leenen, Louise
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 69 - 77
  • [26] Distributed Cyber Attack Detection for Power Network Systems
    Hashimoto, Hideaki
    Hayakawa, Tomohisa
    2011 50TH IEEE CONFERENCE ON DECISION AND CONTROL AND EUROPEAN CONTROL CONFERENCE (CDC-ECC), 2011, : 5820 - 5824
  • [27] Modeling active cyber attack for network vulnerability assessment
    Eom, Jung-Ho
    Han, Young-Ju
    Chung, Tai-Myoung
    FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2006 WORKSHOPS, PROCEEDINGS, 2006, 4331 : 971 - +
  • [28] Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach
    Moskal, Stephen
    Yang, Shanchieh Jay
    Kuhl, Michael E.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (01): : 13 - 29
  • [29] A Computer Network Attack Taxonomy and Ontology
    van Heerden, R. P.
    Irwin, B.
    Burke, I. D.
    Leenen, L.
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2012, 2 (03) : 12 - 25
  • [30] Research on task-deployment for the distributed simulation of computer network attack and defense exercises
    Chen, Meng
    Jiao, Jian
    Yang, Yi
    Luo, Min
    Xia, Chunhe
    Journal of Computational Information Systems, 2010, 6 (04): : 1037 - 1050