Title :
Simulating attack behaviors in enterprise networks
Author :
Moskal, Stephen ; Kreider, Derek ; Hays, Lydia ; Wheeler, B. ; Yang, Shanchieh Jay ; Kuhl, Matthias
Author_Institution :
Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA
Abstract :
Research works on cyber security have shifted from simply hardening the networked systems to enabling fight-through technologies where the system is resilient to sophisticated attacks. A much-needed effort in this new premise is a better understanding of how attackers might behave within a well-protected network. Attack behavior analysis can benefit from automated simulations for large-scale enterprise networks. This work reviews existing efforts on attack behavior modeling and simulation, leading to the discussion of CyberSim, a modular system for cyber attack behavior simulation.
Keywords :
business data processing; digital simulation; security of data; CyberSim; attack behavior analysis; cyber attack behavior simulation; cyber security; fight-through technologies; large-scale enterprise networks; Analytical models; Computational modeling; Markov processes; Mathematical model; Security; Sensors;
Conference_Titel :
Communications and Network Security (CNS), 2013 IEEE Conference on
Conference_Location :
National Harbor, MD
DOI :
10.1109/CNS.2013.6682726