IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • Turkish Journal of Electrical Engineering and Computer Science
  • Volume:26 Issue:4
  • Presenting a method to perform cyber maneuvers

Presenting a method to perform cyber maneuvers

Authors : Mohammad SHAKIBAZAD, Alijabar RASHIDI
Pages : 1977-1988
View : 13 | Download : 11
Publication Date : 0000-00-00
Article Type : Research Paper
Abstract :Performing cyber maneuvers in an operational environment is not easy. We need a cyber-situational awareness framework to perform its maneuvers to protect the cyberspace and to cope with its attacks. The battlefield provided has essential information for detecting cybercrime events. The present study resolved the challenges of implementing these maneuvers through dynamic simulation of the cyber battlefield. The cyber battlefield contains detailed information on cyberspace elements, including the vulnerability knowledge repository, the tangible and intangible components of the cyberspace allowing maneuvering, penetration testing, injection attacks, tracking attacks, visualization, evaluation of the impact of cyberattacks, and risk evaluation. By injecting attacks and using the proposed algorithms, an impact assessment of each attack step on each of the elements of the environment has been done to identify potential threats. Using the proposed algorithms, an impact assessment has been performed on each of the environmental elements in order to identify potential threats. A dynamic updating simulator engine has been designed to update the vulnerability knowledge base automatically and change the topology and features of elements, accesses, services, hosts, and users. Modeling and simulation were evaluated using a qualitative research method and creating a focus group.
Keywords : Cyber maneuvers, cyber defense, cyberspace simulator, cyber battlefield

ORIGINAL ARTICLE URL
VIEW PAPER (PDF)

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2025