MODELING AND SIMULATION OF COOPERATION AND LEARNING IN CYBER SECURITY DEFENSE TEAMS

被引:0
|
作者
Legato, Pasquale [1 ]
Mazza, Rina Mary [1 ]
机构
[1] Univ Calabria, Dept Informat Modeling Elect & Syst Engn, Via P Bucci 42C, I-87036 Arcavacata Di Rende, CS, Italy
关键词
Simulation optimization; cyber security; team formation and cooperation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber security analysts may be organized in teams to share skills and support each other upon the occurrence of cyber attacks. Team work is expected to enforce the mitigation capability against unpredictable attacks addressed against a set of cyber assets requiring protection. A conceptual model for evaluating the expected performances of cooperating analysts by reproducing their learning process within a team is proposed. Analytical approaches to solve the underlying state-space model under stochastic evolution and discrete-event simulation are both discussed. The basic assumption is that a set of regeneration points corresponds to skill achievement through learning. A Simulation-based Optimization (SO) tool ranging from the inner level modeling of the cooperation-based learning process to the outer assignment of analysts to assets is then presented. Team formation may be supported by the SO tool for obtaining the team composition, in terms of individuals and skills, that maximizes system performance measures. Numerical results are reported for illustrative purposes.
引用
收藏
页码:502 / 509
页数:8
相关论文
共 50 条
  • [41] Edge Intelligence Assisted Gateway Defense in Cyber Security
    Xu, Shengjie
    Qian, Yi
    Hu, Rose Qingyang
    IEEE NETWORK, 2020, 34 (04): : 14 - 19
  • [42] Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey
    Singh, Jaskaran
    Wazid, Mohammad
    Das, Ashok Kumar
    Chamola, Vinay
    Guizani, Mohsen
    COMPUTER COMMUNICATIONS, 2022, 192 : 316 - 331
  • [44] Leveraging Information Security Continuous Monitoring for Cyber Defense
    AlSadhan, Tina
    Park, Joon
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 401 - 408
  • [45] EXPERIMENTS WITH SIMULATION OF BOTNETS AND DEFENSE AGENT TEAMS
    Kotenko, Igor
    PROCEEDINGS 27TH EUROPEAN CONFERENCE ON MODELLING AND SIMULATION ECMS 2013, 2013, : 61 - +
  • [46] Blueprint for Cyber Security Zone Modeling
    Gontarczyk, Andrew
    McMillan, Phil
    Pavlovski, Chris
    INFORMATION TECHNOLOGY IN INDUSTRY, 2015, 3 (02): : 38 - 45
  • [47] Analysis and Modeling of Cyber Security Precautions
    Durmus, Omer
    Varol, Asaf
    9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [48] Cyber-attack and defense simulation framework
    Bergin, Dennis Lee
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 383 - 392
  • [49] Modeling and executing cyber security exercise scenarios in cyber ranges
    Yamin, Muhammad Mudassar
    Katt, Basel
    COMPUTERS & SECURITY, 2022, 116
  • [50] CYBER SECURITY IN A DIGITAL LEARNING ENVIRONMENT
    Bykov, Valeriy Yu.
    Burov, Oleksandr Yu.
    Dementievska, Nina P.
    INFORMATION TECHNOLOGIES AND LEARNING TOOLS, 2019, 70 (02) : 313 - 331