A Framework to Create a Virtual Cyber Battlefield for Cyber Maneuvers and Impact Assessment

被引:0
|
作者
Mohammad Shakibazad
机构
[1] Malek-Ashtar University of Technology,
[2] NIOPDC,undefined
关键词
Computer security; Cyber space simulator; Cyber maneuver; Cyber battlefield;
D O I
暂无
中图分类号
学科分类号
摘要
One of the best ways to recognize cyber threats is to perform cyber maneuvers. Performing cyber maneuvers in the operating environment has many challenges. The proposed approach is to perform cyber maneuvers and security analyses on a virtual environment that is quite similar to the physical environment. This challenge has been solved by modeling and simulating cyber battlefield. In this model, by gathering detailed data of cyberspace elements including knowledge repository of vulnerability, tangible and intangible elements of cyberspace and the relationships between them, cyber maneuvers, penetration testing, cyber-attacks injection, attack tracking, visualization, cyber-attacks impact assessment and risk assessment can be provided and executed. This research provides a model and tool for identifying the risks in the network and helping to prioritize actions to eliminate threats. For evaluation, the results were compared with the output of the security tools of the Iran fuel smart card project system and the results were reviewed in the focus group.
引用
收藏
页码:615 / 625
页数:10
相关论文
共 50 条
  • [1] A Framework to Create a Virtual Cyber Battlefield for Cyber Maneuvers and Impact Assessment
    Shakibazad, Mohammad
    IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING, 2019, 43 (03) : 615 - 625
  • [2] A Cyber Attack Modeling and Impact Assessment Framework
    Kotenko, Igor
    Chechulin, Andrey
    2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [3] Ukraine: The Cyber Battlefield
    Oconnor P.
    ITNOW, 2022, 64 (02) : 42 - 43
  • [4] VTAC: Virtual terrain assisted impact assessment for cyber attacks
    Argauer, Brian J.
    Yang, Shanchieh Jay
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2008, 2008, 6973
  • [5] Cyber Maneuvers and Maneuver Keys
    Torrieri, Don
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 262 - 267
  • [6] Towards a framework for cyber attack impact analysis of electric cyber physical systems
    Wang, Yinan
    Li, Wei
    Yan, Gangfeng
    Song, Sumian
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2017, : 638 - 643
  • [7] Critical Infrastructure: A Battlefield for Cyber Warfare?
    Izycki, Eduardo
    Vianna, Eduardo Wallier
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2021), 2021, : 454 - 464
  • [8] Presenting a method to perform cyber maneuvers
    Shakibazad, Mohammad
    Rashidi, AliJabar
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2018, 26 (04) : 1977 - 1988
  • [9] A game-theoretic framework for dynamic cyber deception in Internet of Battlefield Things
    Anwar, Ahmed H.
    Kamhoua, Charles
    Leslie, Nandi
    PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, : 522 - 526
  • [10] A Cyber Mission Impact Assessment Tool
    Musman, Scott
    Temin, Aaron
    2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,