Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators
Conference object
Accepted version
Permanent lenke
https://hdl.handle.net/11250/3047789Utgivelsesdato
2023-10-18Metadata
Vis full innførselSamlinger
Originalversjon
https://doi.org/10.1007/978-3-031-19945-5_25Sammendrag
Cybersecurity currently focuses primarily on defenses that detect and prevent cyber-attacks. However, it is more important to regularly verify an organization’s security posture to reinforce its cybersecurity defenses as the IT environment becomes more complex and competitive. Confronted with an increasing use of artificial intelligence (AI) in cyber attacks, attack simulation platforms need to allow software vulnerabilities to be found against AI-powered attacks too. Such simulators will enable defenders to maintain a basic safety level and gain control over their security posture. Gradually, we are moving towards smart and autonomous platforms. This paper reviews established cyberattack simulation scientific research techniques with the goal of presenting a selection of tools and platforms that minimize the biases and inaccuracies inherent in traditional, isolated ad hoc research on A-powered cyberattacks.
Utgiver
SpringerSerie
Lecture Notes in Networks and Systems;Volume 571Tidsskrift
Lecture Notes in Networks and SystemsBeslektede innførsler
Viser innførsler beslektet ved tittel, forfatter og emneord.
-
Teaching cybersecurity to computer science students utilizing terminal sessions recording software as a pedagogical tool
Hassan, Ismail (Peer reviewed; Journal article, 2020)This Innovate Practice Full Paper presents our experience with teaching a cybersecurity course to undergraduate students utilizing terminal sessions recording software as a pedagogical tool.Developing a practical cybersecurity ... -
DoS and DDoS mitigation using Variational Autoencoders
Bårli, Eirik Molde; Yazidi, Anis; Viedma, Enrique Herrera; Haugerud, Hårek (Computer Networks;Volume 199, 9 November 2021, 108399, Peer reviewed; Journal article, 2021-09-01)DoS and DDoS attacks have been growing in size and number over the last decade and existing solutions to mitigate these attacks are largely inefficient. Compared to other types of malicious cyber attacks, DoS and DDoS ... -
Improving Phishing Detection with the Grey Wolf Optimizer
Naser Jaber, Aws; Fritsch, Lothar; Haugerud, Hårek (International Conference on Electronics, Information, and Communication (ICEIC);2022 International Conference on Electronics, Information, and Communication (ICEIC), Conference object, 2022-04-11)With the recent epidemic of COVID-19-themed scam and phishing, the efficient automated detection of such attacks is crucial. Although many anti-phishing solutions, such as lists and similarity and heuristic-based approaches ...