Developing a Complex Simulation Environment for Evaluating Cyber Attacks
نویسندگان
چکیده
The management of oil exploration is among the most important strategic tasks that a nation has. In Brazil, the Campos Basin is a petroleum rich area compassing oceanic fields that accounts for 80% of Brazil's oil production. Because the Campos Basin is offshore, there is a high volume of helicopter traffic in the area. Currently, the Department of Airspace Control, that manages the Brazilian Air Traffic System, is developing a plan to improve Air Traffic Control Operations in this area using ADS-B technology (Automatic Dependent SurveillanceBroadcast). ADS-B will be used in a restricted oceanic airspace to supplement radar coverage to provide better service. As ADS-B technology is new and has vulnerabilities (unencrypted messages in a broadcast transmission mode), understanding the impact of a cyber-attack on the safety and security of Air Traffic Control Operations is a major challenge. This paper provides a case study in the evaluation and assessment of cyber-attacks to critical infrastructure using Simulation Tools. An analysis of the Simulation Environment used and its suitability for its purpose will be presented as a key finding. This environment consists of: 1) a cyber-attack generator; 2) an entitylevel simulation to provide the dynamic behaviors of entities (helicopters and ATS infrastructure); 3) a network simulation that will include modeling ADS-B; and 4) a 3D visualization tool. The HLA protocol will be used to integrate selected components of the testbed. To provide information about the impact to the Campos Basin Air Traffic System, an external tool will be used to export the information to a Log System, for analysis by a cyberassessment tool. This testbed will be used for developing an impact assessment framework that is applicable to a wide range of military and civilian missions.
منابع مشابه
A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems
Security is getting an ever increasingly important issue in cyber-physical systems comprising autonomous systems. However, it is not possible to defend from all possible attacks for cost and performance reasons. An attack ranking is thus necessary. We propose a simulative framework that makes it possible to rank attacks according to their impact. We also describe a case study to assert its usef...
متن کاملAgent-based Modeling and Simulation of Botnets and Botnet Defense
Nowadays we are witnesses of the rapid spread of botnets across the Internet and using them for different cyber attacks against our systems. Botnets join a huge number of compromised computers in the Internet and allow using these computers for performing vulnerability scans, distributing denial-of-service (DDoS) attacks and sending enormous amounts of spam emails. It is a very complex task to ...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملThe Role Of Modeling And Simulation In Developing Secure Computing Environments
Simulating the operation of a computer’s applications can provide models of the computations, which can be used to detect malware. The need for a new approach to detecting malware arises from both the power and stealth of the current threat. In the last decade, attackers have shifted to using complex, multi-phase attacks based on subtle social engineering tactics coupled with advanced cryptogra...
متن کاملCyber Warfare Simulation to Prepare to Control Cyber Space
ccurate simulation of cyber warfare can prepare decision-makers for its challenges. With cyber warfare, it is possible to control an adversaries’ information, target the portions of cyber space used for situational awareness and decision-making, lead the adversary to make desired decisions, and strike directly at the opposition’s mind. A cyber attack diminishes individual and group situational ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012