Improved Cyber Defense Modeling Framework for Modeling and Simulating the Lifecycle of Cyber Defense Activities

被引:1
|
作者
Kim, Donghwa [1 ,2 ]
Ahn, Myung Kil [1 ]
Lee, Seongkee [1 ]
Lee, Donghwan [1 ]
Park, Moosung [1 ]
Shin, Dongkyoo [2 ,3 ]
机构
[1] Agcy Def Dev, Cyber Technol Ctr, Seoul 05771, South Korea
[2] Sejong Univ, Dept Comp Engn, Seoul 05006, South Korea
[3] Sejong Univ, Dept Convergence Engn Intelligent Drone, Seoul 05006, South Korea
关键词
Cybersecurity modeling and simulation; cyber defense model; cyber defense process model; ATTACK;
D O I
10.1109/ACCESS.2023.3324901
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is difficult to assess the business impact of a cyberattack and implement appropriate strategies or policies to enhance cyber resilience and counter future attacks. Penetration testing, which is currently gaining popularity, has been employed to assess cyber defense levels in actual operating environments. However, it is expensive and time-consuming and only reveals the current state of a problem without providing insights into potentially better alternative strategies. To overcome these limitations, cybersecurity modeling and simulation (M&S) research, which includes the crucial component of cyber-defense modeling, is being actively conducted. Most cyber defense modeling approaches only model defenses as a response to cyberattacks, neglecting to consider the complexities in the actual cyber defense activities of organizations. Consequently, the intended aim to evaluate and enhance cyber defense capabilities through analysis cannot be met. In this study, we present a cyber defense process model that models the entire lifecycle of cyber defense activities as the following five phases: prevention, monitoring and detection, initial response, attack analysis, and recovery response. This model not only accounts for defense steps that had been neglected in previous studies but also offers improvements to previously introduced defense steps. Additionally, we present a framework for applying initial and recovery response models by progressively integrating a unit response behavior model to counter cyberattacks. The applicability of the proposed model was verified by using a constructed prototype. The results of this study can be applied to developing an M&S-based experimental environment for assessing the sustainability of missions/businesses that have faced cyberattacks.
引用
收藏
页码:114187 / 114200
页数:14
相关论文
共 50 条
  • [21] Agile monitoring for cyber Defense
    Doyle, J
    Kohane, I
    Long, W
    Shrobe, H
    Szolovits, P
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 318 - 328
  • [22] Cyber defense: Tough standards
    不详
    INTECH, 2004, 51 (11) : 11 - 11
  • [23] Pentagon flunks cyber defense
    Mann, P
    AVIATION WEEK & SPACE TECHNOLOGY, 1999, 150 (15): : 69 - 70
  • [24] Foundations for Cyber Zone Defense
    Mitchell, Robert
    Sery, Paul
    Klitsner, Tom
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [25] Organized cyber defense competitions
    Dodge, RC
    Ragsdale, DJ
    IEEE INTERNATIONAL CONFERENCE ON ADVANCED LEARNING TECHNOLOGIES, PROCEEDINGS, 2004, : 768 - 770
  • [26] Cyber defense: Art to science
    Saydjari, OS
    COMMUNICATIONS OF THE ACM, 2004, 47 (03) : 52 - 57
  • [27] Building Resilient Cyber Defense
    Kharwal, Rakesh
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 5 - 5
  • [28] Neuroevolution for Autonomous Cyber Defense
    Heckel, Kade M.
    PROCEEDINGS OF THE 2023 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION, GECCO 2023 COMPANION, 2023, : 651 - 654
  • [29] Architecture of a Cyber Defense competition
    Schepens, WJ
    James, JR
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 4300 - 4305
  • [30] Denial and Deception in Cyber Defense
    Heckman, Kristin E.
    Stech, Frank J.
    Schmoker, Ben S.
    Thomas, Roshan K.
    COMPUTER, 2015, 48 (04) : 36 - 44