• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

Vol. 14, No. 5, May 31, 2020
10.3837/tiis.2020.05.018, Download Paper (Free):

Abstract

Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
J. Kim and H. Kim, "DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective," KSII Transactions on Internet and Information Systems, vol. 14, no. 5, pp. 2186-2203, 2020. DOI: 10.3837/tiis.2020.05.018.

[ACM Style]
Jiyeon Kim and Hyung-Jong Kim. 2020. DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective. KSII Transactions on Internet and Information Systems, 14, 5, (2020), 2186-2203. DOI: 10.3837/tiis.2020.05.018.

[BibTeX Style]
@article{tiis:23564, title="DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective", author="Jiyeon Kim and Hyung-Jong Kim and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2020.05.018}, volume={14}, number={5}, year="2020", month={May}, pages={2186-2203}}