MODELING AND SIMULATION OF COOPERATION AND LEARNING IN CYBER SECURITY DEFENSE TEAMS

被引:0
|
作者
Legato, Pasquale [1 ]
Mazza, Rina Mary [1 ]
机构
[1] Univ Calabria, Dept Informat Modeling Elect & Syst Engn, Via P Bucci 42C, I-87036 Arcavacata Di Rende, CS, Italy
关键词
Simulation optimization; cyber security; team formation and cooperation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber security analysts may be organized in teams to share skills and support each other upon the occurrence of cyber attacks. Team work is expected to enforce the mitigation capability against unpredictable attacks addressed against a set of cyber assets requiring protection. A conceptual model for evaluating the expected performances of cooperating analysts by reproducing their learning process within a team is proposed. Analytical approaches to solve the underlying state-space model under stochastic evolution and discrete-event simulation are both discussed. The basic assumption is that a set of regeneration points corresponds to skill achievement through learning. A Simulation-based Optimization (SO) tool ranging from the inner level modeling of the cooperation-based learning process to the outer assignment of analysts to assets is then presented. Team formation may be supported by the SO tool for obtaining the team composition, in terms of individuals and skills, that maximizes system performance measures. Numerical results are reported for illustrative purposes.
引用
收藏
页码:502 / 509
页数:8
相关论文
共 50 条
  • [21] Privacy and security Cyber Defense Triad for Where Security Matters
    Schell, Roger R.
    COMMUNICATIONS OF THE ACM, 2016, 59 (11) : 20 - 23
  • [22] Research and Challenges of Reinforcement Learning in Cyber Defense Decision-Making for Intranet Security
    Wang, Wenhao
    Sun, Dingyuanhao
    Jiang, Feng
    Chen, Xingguo
    Zhu, Cheng
    ALGORITHMS, 2022, 15 (04)
  • [23] Cyber Security of HVDC Systems: A Review of Cyber Threats, Defense, and Testbeds
    Presekal, Alfan
    Jorjani, Mohsen
    Rajkumar, Vetrivel Subramaniam
    Goyel, Himanshu
    Cibin, Nicola
    Semertzis, Ioannis
    Stefanov, Alexandru
    Palensky, Peter
    IEEE ACCESS, 2024, 12 : 165756 - 165773
  • [24] Cyber Security Operations Centre Security Monitoring for protecting Business and supporting Cyber Defense Strategy
    Onwubiko, Cyril
    2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015,
  • [25] Cyber-Physical Power System (CPPS): A Review on Modeling, Simulation, and Analysis With Cyber Security Applications
    Yohanandhan, Rajaa Vikhram
    Elavarasan, Rajvikram Madurai
    Manoharan, Premkumar
    Mihet-Popa, Lucian
    IEEE ACCESS, 2020, 8 : 151019 - 151064
  • [26] Machine learning and cyber security
    Karius, Sebastian
    Knoechel, Mandy
    Hesse, Sascha
    Reiprich, Tim
    IT-INFORMATION TECHNOLOGY, 2023, 65 (4-5): : 142 - 154
  • [27] DEFENSE AND SECURITY APPLICATIONS OF MODELING AND SIMULATION - GRAND CHALLENGES AND CURRENT EFFORTS
    Tolk, Andreas
    Adam, Nabil R.
    Cayirci, Erdal
    Pickl, Stefan
    Shumaker, Randall
    Sullivan, Joseph A.
    Waite, William F.
    2012 WINTER SIMULATION CONFERENCE (WSC), 2012,
  • [28] Learning Outcomes for Cyber Defense Competitions
    Woszczynski, Amy B. (awoszczy@kennesaw.edu), 1600, ISCAP- Information Systems and Computing Academic Professionals (28):
  • [29] On the Security of Cyber-Physical Robotic Systems Using Dynamic Modeling and Simulation
    Hector, Joshua B.
    Katsiaris, Pantelis
    Carey, Nicole E.
    Cote, Nick
    Rawat, Danda B.
    2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [30] The limits of defense and security cooperation in Southeast Asia
    Simon, S
    JOURNAL OF ASIAN AND AFRICAN STUDIES, 1998, 33 (01) : 62 - 75