Simulation

Best Practices for Designing and Conducting Cyber-Physical-System War Games

Abstract:

Cyber war games have been shown to be useful for a broad range of purposes. The authors describe and compare  methods for  designing  realistic war games  in  the  domain of Cyber Physical Systems (CPS), review general methods for conducting war games, and illustrate best practices to assist researchers and practitioners in planning their own war games. 

Informing Active Cyber Defence with Realistic Adversarial Behaviour

Abstract:

In this paper, a cross-disciplinary approach is employed to inform the planning efforts of active cyber defence for military leaders. Militaries across the world are operating under the assumption that cyberspace infrastructure is vulnerable, and potentially compromised, at any given time. Therefore, proactive measures are being taken to secure critical systems, and these measures are known as active cyber defence. In this work, a dataset of empirically observed adversary behaviour activities, collected at the 2015 North American International Cyber Summit (NAICS), is added to an existing cyber warfare simulation framework.

DDoS Attack Simulation to Validate the Effectiveness of Common and Emerging Threats

Abstract:

Distributed Denial of Service (DDoS) attacks are a persistent cyber threat and a growing concern in computer security. This paper seeks to analyse DDoS attacks and the technologies that have been developed in an attempt to combat their effectiveness. This paper includes results from a DDoS simulation using commercial hardware appliances to both demonstrate and measure the effectiveness of DDoS attacks on a targeted victim. The simulation validates the relevance of these hardware appliances in identifying and reducing network vulnerabilities. This paper also provides insight on the current impact of DDoS attacks globally and the threat that these attacks pose in the future.

Specifying Functional Requirements for Simulating Professional Offensive Cyber Operations

ABSTRACT

Several nations are acquiring the capability for conducting professional offensive cyber operations to fight wars and combat crime and terrorism. They need to know how the attack process works, what resources are required, and how to command and control operations. Simulation is a powerful technology for gaining understanding about such issues. This article presents the functional requirements specification for an agent-based simulator of professional offensive cyber operations in a networked environment. Requirements cover the simulation infrastructure, including time handling, stochastic behaviour, modelling representation, interfacing, and simulation control. Cyber-specific use cases are grouped by stakeholder and phase of operation.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com