Vis enkel innførsel

dc.contributor.authorYamin, Muhammad Mudassar
dc.contributor.authorKatt, Basel
dc.date.accessioned2023-03-14T07:21:20Z
dc.date.available2023-03-14T07:21:20Z
dc.date.created2022-08-31T11:58:31Z
dc.date.issued2022
dc.identifier.issn0167-4048
dc.identifier.urihttps://hdl.handle.net/11250/3058033
dc.description.abstractWith the ever-changing cybersecurity landscape, the need for a continuous training for new cybersecurity skill sets is a requirement. Such continuous training programs can be delivered on platforms like cyber ranges. Cyber ranges support training by providing a simulated or emulated representation of a computer network infrastructure, besides additional training and testing services. Cyber attack and defense skills can be gained by attacking and defending a simulated or an emulated infrastructure. However, to provide a realistic training in such infrastructures, there is a need for necessary friction in the environment. Human teams, playing both attackers’ and defenders’ roles, provide this friction. Involving human teams in large-scale cybersecurity exercises is relatively inefficient and not feasible for standardizing training because different teams apply different tactics. Currently, the proposed solutions for cyber range training platforms focus on automating the deployment of the cybersecurity exercise infrastructure but not on the execution part. This leaves a room for improving exercise execution by adding realism and efficiency. This research presents an agent-based system that emulates cyber attack and defense actions during cybersecurity exercise execution; this helps provide realistic and efficient cybersecurity training. To specify agents’ behavior and decision making, a new formal model, called the execution plan (EP), was developed and utilized in this work.en_US
dc.language.isoengen_US
dc.publisherElsevieren_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titleUse of cyber attack and defense agents in cyber ranges: A case studyen_US
dc.title.alternativeUse of cyber attack and defense agents in cyber ranges: A case studyen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.source.volume122en_US
dc.source.journalComputers & Securityen_US
dc.identifier.doi10.1016/j.cose.2022.102892
dc.identifier.cristin2047540
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal