MODELING AND SIMULATION OF COOPERATION AND LEARNING IN CYBER SECURITY DEFENSE TEAMS

被引:0
|
作者
Legato, Pasquale [1 ]
Mazza, Rina Mary [1 ]
机构
[1] Univ Calabria, Dept Informat Modeling Elect & Syst Engn, Via P Bucci 42C, I-87036 Arcavacata Di Rende, CS, Italy
关键词
Simulation optimization; cyber security; team formation and cooperation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber security analysts may be organized in teams to share skills and support each other upon the occurrence of cyber attacks. Team work is expected to enforce the mitigation capability against unpredictable attacks addressed against a set of cyber assets requiring protection. A conceptual model for evaluating the expected performances of cooperating analysts by reproducing their learning process within a team is proposed. Analytical approaches to solve the underlying state-space model under stochastic evolution and discrete-event simulation are both discussed. The basic assumption is that a set of regeneration points corresponds to skill achievement through learning. A Simulation-based Optimization (SO) tool ranging from the inner level modeling of the cooperation-based learning process to the outer assignment of analysts to assets is then presented. Team formation may be supported by the SO tool for obtaining the team composition, in terms of individuals and skills, that maximizes system performance measures. Numerical results are reported for illustrative purposes.
引用
收藏
页码:502 / 509
页数:8
相关论文
共 50 条
  • [1] Modeling and simulation to support cyber defense
    Damodaran, Suresh K.
    Wagner, Neal
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2020, 17 (01): : 3 - 4
  • [2] Defense Strategies for Epidemic Cyber Security Threats: Modeling and Analysis by Using a Machine Learning Approach
    Sulaiman, Muhammad
    Waseem, Muhammad
    Ali, Addisu Negash
    Laouini, Ghaylen
    Alshammari, Fahad Sameer
    IEEE ACCESS, 2024, 12 : 4958 - 4984
  • [3] Modeling of Intrusion and Defense for Assessment of Cyber Security at Power Substations
    Chen, Ying
    Hong, Junho
    Liu, Chen-Ching
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) : 2541 - 2552
  • [4] Adversarial Reinforcement Learning in a Cyber Security Simulation
    Elderman, Richard
    Pater, Leon J. J.
    Thie, Albert S.
    Drugan, Madalina M.
    Wiering, Marco A.
    ICAART: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL 2, 2017, : 559 - 566
  • [5] Cyber Gamification: Implementing Gamified Adaptive Learning Environments for Effective Cyber Security Teams Education
    Alothman, Basil
    2024 5TH INTERNATIONAL CONFERENCE ON EDUCATION DEVELOPMENT AND STUDIES, ICEDS 2024, 2024, : 33 - 40
  • [6] EXCON teams in cyber security training
    Ostby, Grethe
    Lovell, Kieren Nicolas
    Katt, Basel
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 14 - 19
  • [7] Network security modeling and cyber attack simulation methodology
    Chi, SD
    Park, JS
    Jung, KC
    Lee, JS
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 320 - 333
  • [8] Cyber attack modeling and simulation for network security analysis
    Kuhl, Michael E.
    Kistner, Jason
    Costantini, Kevin
    Sudit, Moises
    PROCEEDINGS OF THE 2007 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2007, : 1159 - +
  • [9] Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
    Rosenberg, Ishai
    Shabtai, Asaf
    Elovici, Yuval
    Rokach, Lior
    ACM COMPUTING SURVEYS, 2021, 54 (05)
  • [10] Multi-agent modelling and simulation of cyber-attacks and cyber-defense for homeland security
    Kotenko, Igor
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 614 - 619