Show simple item record

dc.contributor.authorAlzarqawee, Aws Naser Jaber
dc.contributor.authorFritsch, Lothar
dc.date.accessioned2023-02-01T14:25:33Z
dc.date.available2023-02-01T14:25:33Z
dc.date.created2022-10-21T15:37:15Z
dc.date.issued2023-10-18
dc.identifier.isbn978-3-031-19945-5
dc.identifier.isbn978-3-031-19944-8
dc.identifier.issn2367-3370
dc.identifier.issn2367-3389
dc.identifier.urihttps://hdl.handle.net/11250/3047789
dc.description.abstractCybersecurity currently focuses primarily on defenses that detect and prevent cyber-attacks. However, it is more important to regularly verify an organization’s security posture to reinforce its cybersecurity defenses as the IT environment becomes more complex and competitive. Confronted with an increasing use of artificial intelligence (AI) in cyber attacks, attack simulation platforms need to allow software vulnerabilities to be found against AI-powered attacks too. Such simulators will enable defenders to maintain a basic safety level and gain control over their security posture. Gradually, we are moving towards smart and autonomous platforms. This paper reviews established cyberattack simulation scientific research techniques with the goal of presenting a selection of tools and platforms that minimize the biases and inaccuracies inherent in traditional, isolated ad hoc research on A-powered cyberattacks.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.relation.ispartofAdvances on P2P, Parallel, Grid, Cloud and Internet Computing Proceedings of the 17th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2022)
dc.relation.ispartofseriesLecture Notes in Networks and Systems;Volume 571
dc.relation.urihttps://link.springer.com/chapter/10.1007/978-3-031-19945-5_25
dc.subjectCybersecurityen_US
dc.subjectCybersecurity modelingen_US
dc.subjectCybersecurity simulationen_US
dc.subjectOpen source attack toolkiten_US
dc.subjectModeling and simulation of AI-powered cybersecurityen_US
dc.subjectMachine learningen_US
dc.subjectCyber rangesen_US
dc.titleTowards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulatorsen_US
dc.typeConference objecten_US
dc.description.versionacceptedVersionen_US
cristin.ispublishedtrue
cristin.fulltextpreprint
cristin.qualitycode1
dc.identifier.doihttps://doi.org/10.1007/978-3-031-19945-5_25
dc.identifier.cristin2063824
dc.source.journalLecture Notes in Networks and Systemsen_US
dc.source.volume571en_US
dc.source.issue571en_US
dc.source.pagenumber249-257en_US
dc.subject.nsiVDP::Informasjons- og kommunikasjonsteknologi: 550en_US
dc.subject.nsiVDP::Information and communication technology: 550en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record