DocumentCode
653797
Title
Simulating attack behaviors in enterprise networks
Author
Moskal, Stephen ; Kreider, Derek ; Hays, Lydia ; Wheeler, B. ; Yang, Shanchieh Jay ; Kuhl, Matthias
Author_Institution
Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA
fYear
2013
fDate
14-16 Oct. 2013
Firstpage
359
Lastpage
360
Abstract
Research works on cyber security have shifted from simply hardening the networked systems to enabling fight-through technologies where the system is resilient to sophisticated attacks. A much-needed effort in this new premise is a better understanding of how attackers might behave within a well-protected network. Attack behavior analysis can benefit from automated simulations for large-scale enterprise networks. This work reviews existing efforts on attack behavior modeling and simulation, leading to the discussion of CyberSim, a modular system for cyber attack behavior simulation.
Keywords
business data processing; digital simulation; security of data; CyberSim; attack behavior analysis; cyber attack behavior simulation; cyber security; fight-through technologies; large-scale enterprise networks; Analytical models; Computational modeling; Markov processes; Mathematical model; Security; Sensors;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications and Network Security (CNS), 2013 IEEE Conference on
Conference_Location
National Harbor, MD
Type
conf
DOI
10.1109/CNS.2013.6682726
Filename
6682726
Link To Document