Cy-Through: Toward a Cybersecurity Simulation for Supporting Live, Virtual, and Constructive Interoperability
- Authors
- Lee, Donghwan; Kim, Donghwa; Ahn, Myung Kil; Jang, Wonwoo; Lee, Wonjun
- Issue Date
- 2021
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- Computer security; Interoperability; Data models; Integrated circuit modeling; Computer architecture; Computational modeling; Analytical models; Cybersecurity simulation; simulation platform; virtualization platform; LVC interoperability; prototype demonstration
- Citation
- IEEE ACCESS, v.9, pp.10041 - 10053
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE ACCESS
- Volume
- 9
- Start Page
- 10041
- End Page
- 10053
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/50653
- DOI
- 10.1109/ACCESS.2021.3051072
- ISSN
- 2169-3536
- Abstract
- Cybersecurity simulation is a useful, practical approach to provide insights to counter cyber threats for organizations with a large-scale, complex cyber environment. From the micro behavior of malware on a host to the macroscopic impact of a DDoS attack, various phenomena can be observed and analyzed with simulation scenarios. Many platforms for cybersecurity simulation have been developed to support simulation scenarios and models with different fidelity levels: live, virtual, and constructive. Many platforms for cybersecurity simulation have been developed to support simulation scenarios and models with varying fidelity levels: live, virtual, and constructive. Hence, the support of interoperability between models with different fidelities remained untrodden in the cybersecurity simulation literature. In this paper, we propose a novel cybersecurity simulation platform, Cy-Through, which enables full interoperability between models with different fidelity levels, live/virtual and constructive models. Through the development and demonstration of a prototype of the platform, we prove the possibility of a Live, Virtual, and Constructive (LVC)-interoperable cybersecurity simulation.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholar.korea.ac.kr/handle/2021.sw.korea/50653)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.