Simulation in Cybersecurity: Understanding Techniques, Applications, and Goals
By: Luca Serena , Gabriele D'Angelo , Stefano Ferretti and more
Potential Business Impact:
Helps understand computer attacks and defenses better.
Modeling and simulation are widely used in cybersecurity research to assess cyber threats, evaluate defense mechanisms, and analyze vulnerabilities. However, the diversity of application areas, the variety of cyberattacks scenarios, and the differing objectives of these simulations makes it difficult to identify methodological trends. Existing reviews often focus on specific modeling techniques or application domains, making it challenging to analyze the field as a whole. To address these limitations, we present a comprehensive review of the current state of the art, classifying the selected papers based on four dimensions: the application domain, the types of cyber threats represented, the simulation techniques employed, and the primary goals of the simulation. The review discusses the strengths and limitations of different approaches, identifies which cyber threats are the most suited for simulation-based investigations, and analyzes which modeling paradigms are most appropriate for specific cybersecurity challenges.
Similar Papers
A Comprehensive Evaluation and Practice of System Penetration Testing
Cryptography and Security
Finds computer weaknesses before bad guys do.
Cyber Security Educational Games for Children: A Systematic Literature Review
Cryptography and Security
Makes learning about online safety fun and effective.
Integrating Graph Theoretical Approaches in Cybersecurity Education CSCI-RTED
Cryptography and Security
Helps computers find online dangers using network maps.