Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Cy-Through: Toward a Cybersecurity Simulation for Supporting Live, Virtual, and Constructive Interoperability

Authors
Lee, DonghwanKim, DonghwaAhn, Myung KilJang, WonwooLee, Wonjun
Issue Date
2021
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Computer security; Interoperability; Data models; Integrated circuit modeling; Computer architecture; Computational modeling; Analytical models; Cybersecurity simulation; simulation platform; virtualization platform; LVC interoperability; prototype demonstration
Citation
IEEE ACCESS, v.9, pp.10041 - 10053
Indexed
SCIE
SCOPUS
Journal Title
IEEE ACCESS
Volume
9
Start Page
10041
End Page
10053
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/50653
DOI
10.1109/ACCESS.2021.3051072
ISSN
2169-3536
Abstract
Cybersecurity simulation is a useful, practical approach to provide insights to counter cyber threats for organizations with a large-scale, complex cyber environment. From the micro behavior of malware on a host to the macroscopic impact of a DDoS attack, various phenomena can be observed and analyzed with simulation scenarios. Many platforms for cybersecurity simulation have been developed to support simulation scenarios and models with different fidelity levels: live, virtual, and constructive. Many platforms for cybersecurity simulation have been developed to support simulation scenarios and models with varying fidelity levels: live, virtual, and constructive. Hence, the support of interoperability between models with different fidelities remained untrodden in the cybersecurity simulation literature. In this paper, we propose a novel cybersecurity simulation platform, Cy-Through, which enables full interoperability between models with different fidelity levels, live/virtual and constructive models. Through the development and demonstration of a prototype of the platform, we prove the possibility of a Live, Virtual, and Constructive (LVC)-interoperable cybersecurity simulation.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Won jun photo

Lee, Won jun
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE