An Overview of Cyber Attack and Computer Network Operations Simulation

被引:0
|
作者
Leblanc, Sylvain P. [1 ]
Partington, Andrew [1 ]
Chapman, Ian [2 ]
Bernier, Melanie [2 ]
机构
[1] Royal Mil Coll Canada, Comp Secur Lab, Kingston, ON, Canada
[2] Def Res & Dev Canada, Ctr Operat Res & Anal, Ottawa, ON, Canada
关键词
Overview; Survey Paper; Cyber Attacks; Cyber Warfare; Computer Network Operations;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper represents a snapshot of the current state of the art in the simulation and modeling of cyber attacks and defensive responses to those. It discusses a number of simulations of cyber warfare, including live, virtual, and constructive simulations. The simulations discussed in this paper were found in the open literature and were conducted in the private sector, academia, and government. Each simulation is briefly described, including goals, methodology, and a brief discussion of its accomplishments. These modeling and simulation efforts are of particular interest to the military modeling and simulation community, as it is likely that military forces will continue to rely ever more heavily on computer and communication networks.
引用
收藏
页码:92 / 100
页数:9
相关论文
共 50 条
  • [41] Development of Network Cyber Attack Training Curriculum for Security Staff
    Kim, Guk-Il
    Kim, Jonghyeon
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 210 - 214
  • [42] Operations Research and Cyber-infrastructure (Operations Research/Computer Science Interfaces Series) (Hardcover)
    Bharath, R.
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2010, 61 (05) : 890 - 890
  • [44] An Overview of Cyber-Resilient Smart Inverters Based on Practical Attack Models
    Ahn, Bohyun
    Kim, Taesic
    Ahmad, Seerin
    Mazumder, Sudip Kumar
    Johnson, Jay
    Mantooth, H. Alan
    Farnell, Chris
    IEEE TRANSACTIONS ON POWER ELECTRONICS, 2024, 39 (04) : 4657 - 4673
  • [45] Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics
    Puchalski, Damian
    Pawlicki, Marek
    Kozik, Rafal
    Renk, Rafal
    Choras, Michal
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [46] Social network attack simulation with honeytokens
    White, Jonathan
    Park, Joon S.
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    SOCIAL NETWORK ANALYSIS AND MINING, 2014, 4 (01) : 1 - 14
  • [47] RVM Assessment Model for Computer Network Attack
    Yang, Yang
    Yu, Wang
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2010, : 104 - 107
  • [48] Research on Computer Network Security Anti - attack
    Liang, Liu Zheng
    Min, Lai
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 188 - 191
  • [49] Discussion on the Legal Regulation of Computer Network Attack
    Zhang, Min
    Zhong, Shuangxi
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SOCIAL SCIENCE, MANAGEMENT AND SPORTS (ICESSMS 2016), 2016, 92 : 8 - 10
  • [50] DMAT: A new network and computer attack classification
    Jiang, Wei
    Tian, Zhi-Hong
    Cui, Xiang
    Journal of Engineering Science and Technology Review, 2013, 6 (05) : 101 - 106