An Overview of Cyber Attack and Computer Network Operations Simulation

被引:0
|
作者
Leblanc, Sylvain P. [1 ]
Partington, Andrew [1 ]
Chapman, Ian [2 ]
Bernier, Melanie [2 ]
机构
[1] Royal Mil Coll Canada, Comp Secur Lab, Kingston, ON, Canada
[2] Def Res & Dev Canada, Ctr Operat Res & Anal, Ottawa, ON, Canada
关键词
Overview; Survey Paper; Cyber Attacks; Cyber Warfare; Computer Network Operations;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper represents a snapshot of the current state of the art in the simulation and modeling of cyber attacks and defensive responses to those. It discusses a number of simulations of cyber warfare, including live, virtual, and constructive simulations. The simulations discussed in this paper were found in the open literature and were conducted in the private sector, academia, and government. Each simulation is briefly described, including goals, methodology, and a brief discussion of its accomplishments. These modeling and simulation efforts are of particular interest to the military modeling and simulation community, as it is likely that military forces will continue to rely ever more heavily on computer and communication networks.
引用
收藏
页码:92 / 100
页数:9
相关论文
共 50 条
  • [31] COMPUTER SIMULATION AND NAVIGATION IN SURGICAL OPERATIONS
    Nuzhnaya, K. V.
    Mishvelov, A. E.
    Osadchiy, S. S.
    Tsoma, M. V.
    Slanova, R. H.
    Kurbanova, A. M.
    Guzheva, K. A.
    Rodin, I. A.
    Nagdalian, A. A.
    Rzhepakovskiy, I. V.
    Piskov, S. I.
    Povetkin, S. N.
    Mikhailenko, V. V.
    PHARMACOPHORE, 2019, 10 (04): : 43 - 48
  • [32] Computer simulation of complex dragline operations
    Mirabediny, H.
    Baafi, E.Y.
    Whitchurch, K.D.
    Monograph Series - Australasian Institute of Mining and Metallurgy, 2001, 23 : 475 - 484
  • [33] Defensive Cyber Operations in a Software-Defined Network
    Parker, Thomas
    Jones, Jeremy
    Mayberry, Joshua
    Chanman, Gassium
    Staples, Zachary
    Tummala, Murali
    McEachen, John
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 5561 - 5568
  • [34] Research on computer network attack modeling based on attack graph
    Wang, Guo-Yu
    Wang, Hui-Mei
    Chen, Zhi-Jie
    Xian, Ming
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (04): : 74 - 80
  • [35] Overview of attack and defence tactics on network security
    Sheng, Huanye
    Wang, Jue
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 31 (08): : 82 - 87
  • [36] Computer-aided simulation model for natural gas pipeline network system operations
    Nimmanonda, P
    Uraikul, V
    Chan, CW
    Tontiwachwuthikul, P
    INDUSTRIAL & ENGINEERING CHEMISTRY RESEARCH, 2004, 43 (04) : 990 - 1002
  • [37] A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems
    Dini, Gianluca
    Tiloca, Marco
    MODELLING AND SIMULATION FOR AUTONOMOUS SYSTEMS, MESAS 2014, 2014, 8906 : 77 - 94
  • [38] Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks
    Hayel, Yezekael
    Zhu, Quanyan
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2015, 2015, 9406 : 22 - 34
  • [39] AN OVERVIEW OF COMPUTER-SIMULATION IN MANUFACTURING
    NWOKE, BU
    NELSON, DR
    INDUSTRIAL ENGINEERING, 1993, 25 (07): : 43 - 45
  • [40] Ranking Cyber Attack Vulnerability of Nodes in Power Transmission Network
    Arif, Shaila
    Rabbi, Ata E.
    Aziz, Tareq
    2020 INTERNATIONAL CONFERENCE ON SMART GRIDS AND ENERGY SYSTEMS (SGES 2020), 2020, : 419 - 424