Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators
Original version
https://doi.org/10.1007/978-3-031-19945-5_25Abstract
Cybersecurity currently focuses primarily on defenses that detect and prevent cyber-attacks. However, it is more important to regularly verify an organization’s security posture to reinforce its cybersecurity defenses as the IT environment becomes more complex and competitive. Confronted with an increasing use of artificial intelligence (AI) in cyber attacks, attack simulation platforms need to allow software vulnerabilities to be found against AI-powered attacks too. Such simulators will enable defenders to maintain a basic safety level and gain control over their security posture. Gradually, we are moving towards smart and autonomous platforms. This paper reviews established cyberattack simulation scientific research techniques with the goal of presenting a selection of tools and platforms that minimize the biases and inaccuracies inherent in traditional, isolated ad hoc research on A-powered cyberattacks.
Publisher
SpringerSeries
Lecture Notes in Networks and Systems;Volume 571Journal
Lecture Notes in Networks and SystemsRelated items
Showing items related by title, author, creator and subject.
-
Teaching cybersecurity to computer science students utilizing terminal sessions recording software as a pedagogical tool
Hassan, Ismail (Peer reviewed; Journal article, 2020)This Innovate Practice Full Paper presents our experience with teaching a cybersecurity course to undergraduate students utilizing terminal sessions recording software as a pedagogical tool.Developing a practical cybersecurity ... -
DoS and DDoS mitigation using Variational Autoencoders
Bårli, Eirik Molde; Yazidi, Anis; Viedma, Enrique Herrera; Haugerud, Hårek (Computer Networks;Volume 199, 9 November 2021, 108399, Peer reviewed; Journal article, 2021-09-01)DoS and DDoS attacks have been growing in size and number over the last decade and existing solutions to mitigate these attacks are largely inefficient. Compared to other types of malicious cyber attacks, DoS and DDoS ... -
Improving Phishing Detection with the Grey Wolf Optimizer
Naser Jaber, Aws; Fritsch, Lothar; Haugerud, Hårek (International Conference on Electronics, Information, and Communication (ICEIC);2022 International Conference on Electronics, Information, and Communication (ICEIC), Conference object, 2022-04-11)With the recent epidemic of COVID-19-themed scam and phishing, the efficient automated detection of such attacks is crucial. Although many anti-phishing solutions, such as lists and similarity and heuristic-based approaches ...