Improved Cyber Defense Modeling Framework for Modeling and Simulating the Lifecycle of Cyber Defense Activities

被引:1
|
作者
Kim, Donghwa [1 ,2 ]
Ahn, Myung Kil [1 ]
Lee, Seongkee [1 ]
Lee, Donghwan [1 ]
Park, Moosung [1 ]
Shin, Dongkyoo [2 ,3 ]
机构
[1] Agcy Def Dev, Cyber Technol Ctr, Seoul 05771, South Korea
[2] Sejong Univ, Dept Comp Engn, Seoul 05006, South Korea
[3] Sejong Univ, Dept Convergence Engn Intelligent Drone, Seoul 05006, South Korea
关键词
Cybersecurity modeling and simulation; cyber defense model; cyber defense process model; ATTACK;
D O I
10.1109/ACCESS.2023.3324901
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is difficult to assess the business impact of a cyberattack and implement appropriate strategies or policies to enhance cyber resilience and counter future attacks. Penetration testing, which is currently gaining popularity, has been employed to assess cyber defense levels in actual operating environments. However, it is expensive and time-consuming and only reveals the current state of a problem without providing insights into potentially better alternative strategies. To overcome these limitations, cybersecurity modeling and simulation (M&S) research, which includes the crucial component of cyber-defense modeling, is being actively conducted. Most cyber defense modeling approaches only model defenses as a response to cyberattacks, neglecting to consider the complexities in the actual cyber defense activities of organizations. Consequently, the intended aim to evaluate and enhance cyber defense capabilities through analysis cannot be met. In this study, we present a cyber defense process model that models the entire lifecycle of cyber defense activities as the following five phases: prevention, monitoring and detection, initial response, attack analysis, and recovery response. This model not only accounts for defense steps that had been neglected in previous studies but also offers improvements to previously introduced defense steps. Additionally, we present a framework for applying initial and recovery response models by progressively integrating a unit response behavior model to counter cyberattacks. The applicability of the proposed model was verified by using a constructed prototype. The results of this study can be applied to developing an M&S-based experimental environment for assessing the sustainability of missions/businesses that have faced cyberattacks.
引用
收藏
页码:114187 / 114200
页数:14
相关论文
共 50 条
  • [41] Active Cyber Defense as a Preemptive Self-Defense Measure
    Gokce, Yasir
    STRATEGIC CYBER DEFENSE: A MULTIDISCIPLINARY PERSPECTIVE, 2017, 48 : 120 - 128
  • [42] A Cyber Attack Modeling and Impact Assessment Framework
    Kotenko, Igor
    Chechulin, Andrey
    2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [43] Modeling and Simulation Framework for Cyber Physical Systems
    Xiao, Tianyuan
    Fan, Wenhui
    ADVANCED METHODS, TECHNIQUES, AND APPLICATIONS IN MODELING AND SIMULATION, 2012, 4 : 105 - 115
  • [44] MTD Assessment Framework with Cyber Attack Modeling
    Van Leeuwen, Brian
    Stout, William
    Urias, Vincent
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 316 - 323
  • [45] Visual displays for cyber network defense
    Sushereba, Christen E. L.
    Bennett, Kevin B.
    Bryant, Adam
    ERGONOMICS, 2020, 63 (02) : 191 - 209
  • [46] Manpower Planning and Management in Cyber Defense
    Kilaz, Ilker
    Onder, Akif
    Yanik, Murat
    PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 116 - 124
  • [47] Cyber Defense via Event-Based Modeling: An Approach for Modeling and Querying System of Systems Behaviors for Unwanted States
    Rivera, Joey
    2017 IEEE 28TH ANNUAL SOFTWARE TECHNOLOGY CONFERENCE (STC), 2017,
  • [48] Defense Strategies for Epidemic Cyber Security Threats: Modeling and Analysis by Using a Machine Learning Approach
    Sulaiman, Muhammad
    Waseem, Muhammad
    Ali, Addisu Negash
    Laouini, Ghaylen
    Alshammari, Fahad Sameer
    IEEE ACCESS, 2024, 12 : 4958 - 4984
  • [49] An Evolutionary Strategy for Resilient Cyber Defense
    Fulp, Errin W.
    Gage, H. Donald
    John, David J.
    McNiece, Matthew R.
    Turkett, William H.
    Zhou, Xin
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [50] Your best cyber defense? Infosharing
    Werner, Debra
    AEROSPACE AMERICA, 2014, 52 (10) : 30 - 33