Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Cy-Through: Toward a Cybersecurity Simulation for Supporting Live, Virtual, and Constructive Interoperability

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Donghwan-
dc.contributor.authorKim, Donghwa-
dc.contributor.authorAhn, Myung Kil-
dc.contributor.authorJang, Wonwoo-
dc.contributor.authorLee, Wonjun-
dc.date.accessioned2021-08-30T05:12:10Z-
dc.date.available2021-08-30T05:12:10Z-
dc.date.created2021-06-19-
dc.date.issued2021-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/50653-
dc.description.abstractCybersecurity simulation is a useful, practical approach to provide insights to counter cyber threats for organizations with a large-scale, complex cyber environment. From the micro behavior of malware on a host to the macroscopic impact of a DDoS attack, various phenomena can be observed and analyzed with simulation scenarios. Many platforms for cybersecurity simulation have been developed to support simulation scenarios and models with different fidelity levels: live, virtual, and constructive. Many platforms for cybersecurity simulation have been developed to support simulation scenarios and models with varying fidelity levels: live, virtual, and constructive. Hence, the support of interoperability between models with different fidelities remained untrodden in the cybersecurity simulation literature. In this paper, we propose a novel cybersecurity simulation platform, Cy-Through, which enables full interoperability between models with different fidelity levels, live/virtual and constructive models. Through the development and demonstration of a prototype of the platform, we prove the possibility of a Live, Virtual, and Constructive (LVC)-interoperable cybersecurity simulation.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleCy-Through: Toward a Cybersecurity Simulation for Supporting Live, Virtual, and Constructive Interoperability-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Wonjun-
dc.identifier.doi10.1109/ACCESS.2021.3051072-
dc.identifier.scopusid2-s2.0-85099594632-
dc.identifier.wosid000609799900001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.9, pp.10041 - 10053-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume9-
dc.citation.startPage10041-
dc.citation.endPage10053-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorComputer security-
dc.subject.keywordAuthorInteroperability-
dc.subject.keywordAuthorData models-
dc.subject.keywordAuthorIntegrated circuit modeling-
dc.subject.keywordAuthorComputer architecture-
dc.subject.keywordAuthorComputational modeling-
dc.subject.keywordAuthorAnalytical models-
dc.subject.keywordAuthorCybersecurity simulation-
dc.subject.keywordAuthorsimulation platform-
dc.subject.keywordAuthorvirtualization platform-
dc.subject.keywordAuthorLVC interoperability-
dc.subject.keywordAuthorprototype demonstration-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Won jun photo

Lee, Won jun
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE