Adversary modeling and simulation in cyber warfare

被引:0
|
作者
Hamilton, Samuel N. [1 ]
Hamilton, Wendy L. [1 ]
机构
[1] Distributed Infin Inc, La Mesa, CA 91941 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modeling and simulation provide many excellent benefits in preparation for successful cyber operations. Whether used for creating realistic training environments, testing new cyber warfare techniques, or predicting possible adversary actions, it is critical for such simulations to take into account the possibility of an active cyber adversary, able to adapt its plans to network conditions. Without real-time high fidelity modeling and simulation, training fails to address how to cope with intelligent and adaptive opponents, and operations become trial and error exercises rife with high-risk improvisation in situations where the adversary does not follow a well defined script. Unfortunately, current simulation techniques are insufficient to model adversaries capable of dynamic adjustment to changes in the simulation environment. Either adversary actions are completely pre-scripted, or live red teams are required to be on hand to tailor adversary actions to circumstances. In this paper, we present a technique for avoiding the prohibitive cost associated with requiring live red team participation during each use of a simulation environment while still providing the advantages dynamic adversary modeling provides. Our approach utilizes game theoretic techniques, using a new probability based search technique to curtail the search-space explosion issues that previous attempts in this area have encountered. This technique, entitled Partially-Serialized Probability Cutoff Search, also includes a new approach to modeling time, allowing modeling of anticipatory strategies and time-dependent attack techniques.
引用
收藏
页码:461 / 475
页数:15
相关论文
共 50 条
  • [1] Hybrid Modeling of Cyber Adversary Behavior
    Sliva, Amy
    Guarino, Sean
    Weyhrauch, Peter
    Galvin, Peter
    Mitchell, Daniel
    Campolongo, Joseph
    Taylor, Jason
    SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, 2017, 10354 : 133 - 138
  • [2] Poster: Worm Propagation Model for Cyber Warfare Modeling and Simulation in Tactical Networks
    Lee, Byeong-uk
    Roh, Byeong-hee
    Ahn, Myung Kil
    Kim, Yong Hyun
    MOBISYS'16: COMPANION COMPANION PUBLICATION OF THE 14TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2016, : 49 - 49
  • [3] Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach
    Moskal, Stephen
    Yang, Shanchieh Jay
    Kuhl, Michael E.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (01): : 13 - 29
  • [4] CYBER WARFARE
    Solis, Gary D.
    MILITARY LAW REVIEW, 2014, 219 : 1 - 52
  • [5] Agent-based Modeling and Simulation of cyber-warfare between malefactors and security agents in internet
    Kotenko, I
    Simulation in Wider Europe, 2005, : 533 - 543
  • [6] The need for cooperation between wargaming and modeling & simulation for examining Cyber, Space, Electronic Warfare, and other topics
    Pournelle, Phillip
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2024, 21 (04): : 359 - 362
  • [7] Cyber Warfare and Electronic Warfare Integration in the operational environment of the future: Cyber Electronic Warfare
    Askin, Osman
    Irmak, Riza
    Avsever, Mustafa
    CYBER SENSING 2015, 2015, 9458
  • [8] Undersea warfare networked modeling and simulation
    Correll, K
    Caddell, M
    Croteau, R
    LeHerissier, W
    1996 MODELING, SIMULATION AND VIRTUAL PROTOTYPING CONFERENCE: A FORUM FOR THE ADVANCEMENT OF MODELING AND SIMULATION APPLICATIONS AND TECHNOLOGY IN THE ACQUISITION PROCESS, 1996, : 165 - 173
  • [9] Cyber Alliances and Proxy Cyber Warfare
    Barbosa, Jorge
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 33 - 38
  • [10] Inside cyber warfare
    Zotti, Alexander
    GLOBAL CHANGE PEACE & SECURITY, 2011, 23 (03) : 437 - 438