A Framework to Create a Virtual Cyber Battlefield for Cyber Maneuvers and Impact Assessment

被引:0
|
作者
Mohammad Shakibazad
机构
[1] Malek-Ashtar University of Technology,
[2] NIOPDC,undefined
关键词
Computer security; Cyber space simulator; Cyber maneuver; Cyber battlefield;
D O I
暂无
中图分类号
学科分类号
摘要
One of the best ways to recognize cyber threats is to perform cyber maneuvers. Performing cyber maneuvers in the operating environment has many challenges. The proposed approach is to perform cyber maneuvers and security analyses on a virtual environment that is quite similar to the physical environment. This challenge has been solved by modeling and simulating cyber battlefield. In this model, by gathering detailed data of cyberspace elements including knowledge repository of vulnerability, tangible and intangible elements of cyberspace and the relationships between them, cyber maneuvers, penetration testing, cyber-attacks injection, attack tracking, visualization, cyber-attacks impact assessment and risk assessment can be provided and executed. This research provides a model and tool for identifying the risks in the network and helping to prioritize actions to eliminate threats. For evaluation, the results were compared with the output of the security tools of the Iran fuel smart card project system and the results were reviewed in the focus group.
引用
收藏
页码:615 / 625
页数:10
相关论文
共 50 条
  • [31] Army Looks to Blend Cyber, EW Capabilities on Battlefield
    Drubin, Cliff
    MICROWAVE JOURNAL, 2013, 56 (12) : 39 - 40
  • [32] Cyber range design framework for cyber security education and training
    Katsantonis, M. N.
    Manikas, A.
    Mavridis, I.
    Gritzalis, D.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 1005 - 1027
  • [33] Cyber range design framework for cyber security education and training
    M. N. Katsantonis
    A. Manikas
    I. Mavridis
    D. Gritzalis
    International Journal of Information Security, 2023, 22 : 1005 - 1027
  • [34] A Data Mining Framework to Predict Cyber Attack for Cyber Security
    Rahman, Md Anisur
    Al-Saggaf, Yeslam
    Zia, Tanveer
    PROCEEDINGS OF THE 15TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2020), 2020, : 207 - 212
  • [35] Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames
    Vaseashta, Ashok
    Susmann, Philip
    Braman, Eric
    CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 1 - 10
  • [36] Cyber Space and Virtual Reality
    Adam, Ozan
    ONLINE JOURNAL OF COMMUNICATION AND MEDIA TECHNOLOGIES, 2012, 2 (02): : 19 - 28
  • [37] An architecture for cyber incident mission impact assessment (CIMIA)
    Sorrels, David
    Grimaila, Michael
    Fortson, Larry
    Mills, Robert
    3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS, 2008, : 335 - +
  • [38] USAF to create cyber-warfare command
    Jane's Def. Weekly, 2006, OCT.
  • [39] Cyber-Security Risk Assessment Framework for Critical Infrastructures
    Baig, Zubair
    Zeadally, Sherali
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2019, 25 (01): : 121 - 129
  • [40] Calculating Business Impact Assessment of Cyber-Threats
    Alves, Diogo
    Apolinario, Filipe
    Pacheco, Bernardo
    Escravana, Nelson
    Grilo, Antonio
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,