MILCOM 2015 - 2015 IEEE Military Communications Conference 2015
DOI: 10.1109/milcom.2015.7357622
|View full text |Cite
|
Sign up to set email alerts
|

Distributed StealthNet (D-SN): Creating a live, virtual, constructive (LVC) environment for simulating cyber-attacks for test and evaluation (T&E)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Torres ve ark. [16], kablolu ve kablosuz tam ölçekli taktiksel sanal ağlarda siber saldırı ve güvenlik yöntemlerinin test ve analizini yapabilen, önceden yapılmış ilgili bazı çalışmalar üzerine kurulu yeni bir simülasyon ortam modeli sunmaktadır. Geliştirilen model ile bir dizi siber saldırı yapılarak belli bir sanal ağ mimarisinin esneklik ve sağlamlığı test edilebilmektedir.…”
Section: Li̇teratür Taramasiunclassified
“…Torres ve ark. [16], kablolu ve kablosuz tam ölçekli taktiksel sanal ağlarda siber saldırı ve güvenlik yöntemlerinin test ve analizini yapabilen, önceden yapılmış ilgili bazı çalışmalar üzerine kurulu yeni bir simülasyon ortam modeli sunmaktadır. Geliştirilen model ile bir dizi siber saldırı yapılarak belli bir sanal ağ mimarisinin esneklik ve sağlamlığı test edilebilmektedir.…”
Section: Li̇teratür Taramasiunclassified
“…Van Leeuwen et al developed a cyber security analysis and experimentation environment for the study of network information systems and communication networks [19]. Torres et al presents a new simulation environment model based on some previous studies that can test and analyse cyber-attack and security methods in wired and wireless full-scale tactical virtual networks [20]. Some researchers have designed a simulation model for the development of testing and experimentation of network systems in cyberspace [21].…”
Section: Related Workmentioning
confidence: 99%
“…Despite the cyber-friendly features such as computer enforced agreements, TENA is not prepared to accommodate cybersecurity simulation. TENA per se is a competitive architecture with LVC interoperability, though there has been a limited number of contributions for simulation models to process cyber-specific events and interactions so far [2], [17]- [19]. In the long run, cybersecurity models can be developed and deployed for TENA, but it is premature to substantialize fully functional LVC interoperable cybersecurity simulation in the TENA architecture.…”
Section: B Tenamentioning
confidence: 99%