dc.contributor.author | Alzarqawee, Aws Naser Jaber | |
dc.contributor.author | Fritsch, Lothar | |
dc.date.accessioned | 2023-02-01T14:25:33Z | |
dc.date.available | 2023-02-01T14:25:33Z | |
dc.date.created | 2022-10-21T15:37:15Z | |
dc.date.issued | 2023-10-18 | |
dc.identifier.isbn | 978-3-031-19945-5 | |
dc.identifier.isbn | 978-3-031-19944-8 | |
dc.identifier.issn | 2367-3370 | |
dc.identifier.issn | 2367-3389 | |
dc.identifier.uri | https://hdl.handle.net/11250/3047789 | |
dc.description.abstract | Cybersecurity currently focuses primarily on defenses that detect and prevent cyber-attacks. However, it is more important to regularly verify an organization’s security posture to reinforce its cybersecurity defenses as the IT environment becomes more complex and competitive. Confronted with an increasing use of artificial intelligence (AI) in cyber attacks, attack simulation platforms need to allow software vulnerabilities to be found against AI-powered attacks too. Such simulators will enable defenders to maintain a basic safety level and gain control over their security posture. Gradually, we are moving towards smart and autonomous platforms. This paper reviews established cyberattack simulation scientific research techniques with the goal of presenting a selection of tools and platforms that minimize the biases and inaccuracies inherent in traditional, isolated ad hoc research on A-powered cyberattacks. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Springer | en_US |
dc.relation.ispartof | Advances on P2P, Parallel, Grid, Cloud and Internet Computing Proceedings of the 17th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2022) | |
dc.relation.ispartofseries | Lecture Notes in Networks and Systems;Volume 571 | |
dc.relation.uri | https://link.springer.com/chapter/10.1007/978-3-031-19945-5_25 | |
dc.subject | Cybersecurity | en_US |
dc.subject | Cybersecurity modeling | en_US |
dc.subject | Cybersecurity simulation | en_US |
dc.subject | Open source attack toolkit | en_US |
dc.subject | Modeling and simulation of AI-powered cybersecurity | en_US |
dc.subject | Machine learning | en_US |
dc.subject | Cyber ranges | en_US |
dc.title | Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators | en_US |
dc.type | Conference object | en_US |
dc.description.version | acceptedVersion | en_US |
cristin.ispublished | true | |
cristin.fulltext | preprint | |
cristin.qualitycode | 1 | |
dc.identifier.doi | https://doi.org/10.1007/978-3-031-19945-5_25 | |
dc.identifier.cristin | 2063824 | |
dc.source.journal | Lecture Notes in Networks and Systems | en_US |
dc.source.volume | 571 | en_US |
dc.source.issue | 571 | en_US |
dc.source.pagenumber | 249-257 | en_US |
dc.subject.nsi | VDP::Informasjons- og kommunikasjonsteknologi: 550 | en_US |
dc.subject.nsi | VDP::Information and communication technology: 550 | en_US |