2018
DOI: 10.1007/978-3-030-03638-6_15
|View full text |Cite
|
Sign up to set email alerts
|

Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…This paper builds upon the 2018 NordSec conference paper [8] which showed the general feasibility of attack simulation and its ability to generate meaningful insights. However, it also showed how susceptible results are to minute details of the benchmark network.…”
Section: Main Contributionmentioning
confidence: 99%
See 3 more Smart Citations
“…This paper builds upon the 2018 NordSec conference paper [8] which showed the general feasibility of attack simulation and its ability to generate meaningful insights. However, it also showed how susceptible results are to minute details of the benchmark network.…”
Section: Main Contributionmentioning
confidence: 99%
“…For our case study we assume a mid-sized corporate network consisting of nine subnets. These allow for a considerably more complex network hierarchy than the three subnets used in previous investigations [8], let alone scenarios that consist of merely three hypervisors and five unspecific VMs [24]. While this generally requires more lateral movement for the attacker to compromise all valuable resources, it also provides more occasions for defenses to unfold their potential and learn about their effects.…”
Section: Case Studymentioning
confidence: 99%
See 2 more Smart Citations