• DocumentCode
    653797
  • Title

    Simulating attack behaviors in enterprise networks

  • Author

    Moskal, Stephen ; Kreider, Derek ; Hays, Lydia ; Wheeler, B. ; Yang, Shanchieh Jay ; Kuhl, Matthias

  • Author_Institution
    Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA
  • fYear
    2013
  • fDate
    14-16 Oct. 2013
  • Firstpage
    359
  • Lastpage
    360
  • Abstract
    Research works on cyber security have shifted from simply hardening the networked systems to enabling fight-through technologies where the system is resilient to sophisticated attacks. A much-needed effort in this new premise is a better understanding of how attackers might behave within a well-protected network. Attack behavior analysis can benefit from automated simulations for large-scale enterprise networks. This work reviews existing efforts on attack behavior modeling and simulation, leading to the discussion of CyberSim, a modular system for cyber attack behavior simulation.
  • Keywords
    business data processing; digital simulation; security of data; CyberSim; attack behavior analysis; cyber attack behavior simulation; cyber security; fight-through technologies; large-scale enterprise networks; Analytical models; Computational modeling; Markov processes; Mathematical model; Security; Sensors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Network Security (CNS), 2013 IEEE Conference on
  • Conference_Location
    National Harbor, MD
  • Type

    conf

  • DOI
    10.1109/CNS.2013.6682726
  • Filename
    6682726