TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)
Current Result Document : 1 / 2
ÇѱÛÁ¦¸ñ(Korean Title) |
DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective |
¿µ¹®Á¦¸ñ(English Title) |
DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective |
ÀúÀÚ(Author) |
Jiyeon Kim
Hyung-Jong Kim
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 14 NO. 05 PP. 2186 ~ 2203 (2020. 05) |
Çѱ۳»¿ë (Korean Abstract) |
|
¿µ¹®³»¿ë (English Abstract) |
Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.
|
Å°¿öµå(Keyword) |
cybersecurity
cyberattacks
DEVS formalism
modeling and simulation
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|