Cyber-FIT: An Agent-Based Modelling Approach to Simulating Cyber Warfare

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10354)

Abstract

This paper introduces the Cyber - Forces Interactions Terrain (FIT) Simulation Framework. This framework provides an apparatus with which to carry out virtual experiments involving cyber warfare engagements. Our agent-based modelling approach is a first attempt at providing the necessary components with which military planners can reason about cyber force projections on varying terrains and against various adversarial forces. We simulate and then predict the results of cyber warfare at the level historically desired by military planners: vulnerabilities, asset degradation, and mission capability rate.

Keywords

Cyber warfare Agent-based modelling Simulation Military 

References

  1. 1.
    MITRE Common Vulnerabilities and Exposures. http://cve.mitre.org/
  2. 2.
    MITRE CVE Details. http://www.cvedetails.com/
  3. 3.
    Department of Defense, The DoD Cyber Strategy. DoD, Washington D.C. (2015)Google Scholar
  4. 4.
    Santhi, N., Yan, G., Eidenbenz, S.: CyberSim: geographic, temporal, and organizational dynamics of malware propagation. In: Proceedings of the 2010 Winter Simulation Conference, pp. 2876–2887 (2010)Google Scholar
  5. 5.
    Cayirci, E., Chergherehchi, R.: Modeling cyber attacks and their effects on decision process. In: Proceedings of the 2011 Winter Simulation Conference, pp. 2632–2641 (2011)Google Scholar
  6. 6.
    Fischer, M.J., Masi, D.M.B., Shortle, J.F., Chen, C.H.: Simulating non-stationary congestion systems using splitting with applications to cyber security. In: Proceedings of the 2010 Winter Simulation Conference, pp. 2865–2875 (2010)Google Scholar
  7. 7.
    Omrud, D., Turnbull, B., O’Sullivan, K.O.: System of systems cyber effects simulation ontology. In: Proceedings of the 2015 Winter Simulation Conference, pp. 2475–2486 (2015)Google Scholar
  8. 8.
    Hamilton Jr., J.A.: DoDAF-based information assurance architectures. CrossTalk 19, 4–7 (2006)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Carnegie Mellon UniversityPittsburghUSA

Personalised recommendations