Cyber-attack and defense simulation framework

Author:

Bergin Dennis Lee1

Affiliation:

1. Shenandoah Research and Technology, Mount Jackson, VA, USA

Abstract

Various papers on cyberwarfare in virtual environments and cybersecurity in intelligent systems have been published. Work has focused on the integration of cyberwarfare communication effects into a live–virtual–constructive (LVC) environment in order to better represent a network centric battlespace subject to cyber-attack, at a large force level. In addition, virtual cyber ranges have been developed. A virtual cyber range is a portable modeling and simulation framework that provides a real-time, hardware-in-the-loop capability for simulation of cyber threats to the entire net-centric infrastructure. The framework enables interoperability with LVC simulations, providing training and assessment of human-in-the-loop performance. This work builds on previous work and shows the need for a framework to support the modeling and simulation of cyber-attack and defense for training and assessment. This work does focus on cybersecurity for wireless communications, but the focus is on large network-centric systems at force level. Furthermore, there are published descriptions of research focused on the use of multi-agent systems in vehicle-to-vehicle communication and autonomous driving systems, such as Google’s driverless car. While the vehicles are commercial by nature, there are many similarities to military autonomous vehicles (MAVs), in their system components and architecture as well as the cybersecurity threats that they face. While these works are related to the work presented in this paper, with their focus on synthetic environments and commercial autonomous systems, they are not closely related. The focus of this paper is on small point to point and point to multipoint wireless networks, comprised of only a few nodes, with the nodes representing MAVs and controllers. The US Army, Air Force, and Navy are continuing to increase their use of these systems, and are now focusing on cybersecurity. Due to the lagging focus on wireless networks and autonomous vehicles, there is not much published work that is related. Current unmanned systems were not built with cybersecurity considerations taken into account, and are thus vulnerable to cyber-attack. The objective of this paper is to present and describe the need for a cyber-attack and defense simulation framework to support the modeling and simulation for cybersecurity of autonomous vehicle systems used by US Armed Forces. These autonomous vehicle systems include unmanned aerial systems and unmanned ground systems. The paper describes a notional framework to support this type of modeling, as well as a detailed use case and example cyber-attack simulation system.

Publisher

SAGE Publications

Subject

Engineering (miscellaneous),Modelling and Simulation

Reference8 articles.

Cited by 14 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3