Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Cyber-attack and defense simulation framework

View through CrossRef
Various papers on cyberwarfare in virtual environments and cybersecurity in intelligent systems have been published. Work has focused on the integration of cyberwarfare communication effects into a live–virtual–constructive (LVC) environment in order to better represent a network centric battlespace subject to cyber-attack, at a large force level. In addition, virtual cyber ranges have been developed. A virtual cyber range is a portable modeling and simulation framework that provides a real-time, hardware-in-the-loop capability for simulation of cyber threats to the entire net-centric infrastructure. The framework enables interoperability with LVC simulations, providing training and assessment of human-in-the-loop performance. This work builds on previous work and shows the need for a framework to support the modeling and simulation of cyber-attack and defense for training and assessment. This work does focus on cybersecurity for wireless communications, but the focus is on large network-centric systems at force level. Furthermore, there are published descriptions of research focused on the use of multi-agent systems in vehicle-to-vehicle communication and autonomous driving systems, such as Google’s driverless car. While the vehicles are commercial by nature, there are many similarities to military autonomous vehicles (MAVs), in their system components and architecture as well as the cybersecurity threats that they face. While these works are related to the work presented in this paper, with their focus on synthetic environments and commercial autonomous systems, they are not closely related. The focus of this paper is on small point to point and point to multipoint wireless networks, comprised of only a few nodes, with the nodes representing MAVs and controllers. The US Army, Air Force, and Navy are continuing to increase their use of these systems, and are now focusing on cybersecurity. Due to the lagging focus on wireless networks and autonomous vehicles, there is not much published work that is related. Current unmanned systems were not built with cybersecurity considerations taken into account, and are thus vulnerable to cyber-attack. The objective of this paper is to present and describe the need for a cyber-attack and defense simulation framework to support the modeling and simulation for cybersecurity of autonomous vehicle systems used by US Armed Forces. These autonomous vehicle systems include unmanned aerial systems and unmanned ground systems. The paper describes a notional framework to support this type of modeling, as well as a detailed use case and example cyber-attack simulation system.
Title: Cyber-attack and defense simulation framework
Description:
Various papers on cyberwarfare in virtual environments and cybersecurity in intelligent systems have been published.
Work has focused on the integration of cyberwarfare communication effects into a live–virtual–constructive (LVC) environment in order to better represent a network centric battlespace subject to cyber-attack, at a large force level.
In addition, virtual cyber ranges have been developed.
A virtual cyber range is a portable modeling and simulation framework that provides a real-time, hardware-in-the-loop capability for simulation of cyber threats to the entire net-centric infrastructure.
The framework enables interoperability with LVC simulations, providing training and assessment of human-in-the-loop performance.
This work builds on previous work and shows the need for a framework to support the modeling and simulation of cyber-attack and defense for training and assessment.
This work does focus on cybersecurity for wireless communications, but the focus is on large network-centric systems at force level.
Furthermore, there are published descriptions of research focused on the use of multi-agent systems in vehicle-to-vehicle communication and autonomous driving systems, such as Google’s driverless car.
While the vehicles are commercial by nature, there are many similarities to military autonomous vehicles (MAVs), in their system components and architecture as well as the cybersecurity threats that they face.
While these works are related to the work presented in this paper, with their focus on synthetic environments and commercial autonomous systems, they are not closely related.
The focus of this paper is on small point to point and point to multipoint wireless networks, comprised of only a few nodes, with the nodes representing MAVs and controllers.
The US Army, Air Force, and Navy are continuing to increase their use of these systems, and are now focusing on cybersecurity.
Due to the lagging focus on wireless networks and autonomous vehicles, there is not much published work that is related.
Current unmanned systems were not built with cybersecurity considerations taken into account, and are thus vulnerable to cyber-attack.
The objective of this paper is to present and describe the need for a cyber-attack and defense simulation framework to support the modeling and simulation for cybersecurity of autonomous vehicle systems used by US Armed Forces.
These autonomous vehicle systems include unmanned aerial systems and unmanned ground systems.
The paper describes a notional framework to support this type of modeling, as well as a detailed use case and example cyber-attack simulation system.

Related Results

An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Abstract Cyber-Manufacturing Systems (CMS) are vulnerable to cyber-manufacturing attacks ironically because of its very beneficial advance: seamless integration with...
Cyber defense in breadth: Modeling and analysis of integrated defense systems
Cyber defense in breadth: Modeling and analysis of integrated defense systems
Cybersecurity is one of most critical concerns for any organization, as frequency and severity of cyber attacks constantly increase, resulting in loss of vital assets and/or servic...
The challenges of cybersecurity insurance development: The case of Latvia
The challenges of cybersecurity insurance development: The case of Latvia
Purpose. This paper aims to provide an overview of the current challenges of cybersecurity insurance, focusing on the identification of development constraints and opportunities an...
Security Concerns in Smart Grid Cyber-Physical System
Security Concerns in Smart Grid Cyber-Physical System
A smart grid cyber physical system (SG-CPS) is an optimal fusion of a power network infrastructure and cyber system based on a communicating network. The SG-CPS employs advanced te...
Digital Diplomacy and Cyber Defence
Digital Diplomacy and Cyber Defence
Abstract Having emerged only two decades ago, the field of digital diplomacy and cyber defence is new relative to other aspects of statecraft. Governments did not pr...

Back to Top