MODELING AND SIMULATION OF COOPERATION AND LEARNING IN CYBER SECURITY DEFENSE TEAMS

被引:0
|
作者
Legato, Pasquale [1 ]
Mazza, Rina Mary [1 ]
机构
[1] Univ Calabria, Dept Informat Modeling Elect & Syst Engn, Via P Bucci 42C, I-87036 Arcavacata Di Rende, CS, Italy
关键词
Simulation optimization; cyber security; team formation and cooperation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber security analysts may be organized in teams to share skills and support each other upon the occurrence of cyber attacks. Team work is expected to enforce the mitigation capability against unpredictable attacks addressed against a set of cyber assets requiring protection. A conceptual model for evaluating the expected performances of cooperating analysts by reproducing their learning process within a team is proposed. Analytical approaches to solve the underlying state-space model under stochastic evolution and discrete-event simulation are both discussed. The basic assumption is that a set of regeneration points corresponds to skill achievement through learning. A Simulation-based Optimization (SO) tool ranging from the inner level modeling of the cooperation-based learning process to the outer assignment of analysts to assets is then presented. Team formation may be supported by the SO tool for obtaining the team composition, in terms of individuals and skills, that maximizes system performance measures. Numerical results are reported for illustrative purposes.
引用
收藏
页码:502 / 509
页数:8
相关论文
共 50 条
  • [31] A survey of the security assessment and security defense of a cyber physical power system under cyber failure threat
    Zhu B.
    Guo Y.
    Guo C.
    Jiang Z.
    Zhang X.
    Yuan X.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2021, 49 (01): : 178 - 187
  • [32] Cyber defense in breadth: Modeling and analysis of integrated defense systems
    Cho, Jin-Hee
    Ben-Asher, Noam
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (02): : 147 - 159
  • [33] Prospects for India-US Cyber Security Cooperation
    Samuel, Cherian
    STRATEGIC ANALYSIS, 2011, 35 (05) : 770 - 780
  • [34] Private active cyber defense and (international) cyber security-pushing the line?
    Broeders, Dennis
    JOURNAL OF CYBERSECURITY, 2021, 7 (01):
  • [35] TRAINING OF CYBER SECURITY AND CYBER DEFENSE FOR SPECIALISTS OF FINANCE, ECONOMIC AND BUSINESS MANAGEMENT
    Bykov, Valeriy Yu
    Romanovsky, Alexander A.
    Romanovskaya, Julia Yu
    INFORMATION TECHNOLOGIES AND LEARNING TOOLS, 2020, 80 (06) : 386 - 413
  • [36] Developing a Cyber Incident Exercises Model to Educate Security Teams
    Alothman, Basil
    Alhajraf, Aldanah
    Alajmi, Reem
    Al Farraj, Rawan
    Alshareef, Nourah
    Khan, Murad
    ELECTRONICS, 2022, 11 (10)
  • [37] APPLIED CRYPTOGRAPHY AND PRACTICAL SCENARIOS FOR CYBER SECURITY DEFENSE
    Simion, Emil
    Patrascu, Alecsandru
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2013, 75 (04): : 131 - 142
  • [38] Security Control Grid for Optimized Cyber Defense Planning
    Dutta, Ashutosh
    Al-Shaer, Ehab
    Aghaei, Ehsan
    Duan, Qi
    Yasar, Hasan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 913 - 929
  • [39] Cyber security and cyber defense for Venezuela: an approach from the Soft Systems Methodology
    Torres, Douglas
    COMPLEX & INTELLIGENT SYSTEMS, 2018, 4 (03) : 213 - 226
  • [40] Cyber security and cyber defense for Venezuela: an approach from the Soft Systems Methodology
    Douglas Torres
    Complex & Intelligent Systems, 2018, 4 : 213 - 226