A Multi-layer Approach through Threat Modelling and Attack Simulation for Enhanced Cyber Security Assessment

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

There is a growing concern about the dynamic landscape of cyber security threats escalating, and the need for improvement in defence capabilities against emerging sophisticated incidents. In response, this paper presents a solution called the Cyber Incident Simulation System, which enables system security engineers to simulate cyber-physical attacks and incidents without the requirement to affect or disrupt the ongoing business operation of the system. Leveraging graph-based threat modelling and AI-generated incident data, the system empowers professionals to predict the effect of the incident within the system under study. The synthetic data is used by anomaly-based Intrusion Detection Systems (IDSs) and other additional security controls to improve their detection algorithms to enhance their accuracy and effectiveness. The Cyber Incident Simulation System is designed to enhance the cyber security measures through the simulation of various incident scenarios.

Original languageEnglish
Title of host publicationARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings
PublisherAssociation for Computing Machinery
ISBN (Electronic)9798400717185
DOIs
Publication statusPublished - 30 Jul 2024
Event19th International Conference on Availability, Reliability and Security, ARES 2024 - Vienna, Austria
Duration: 30 Jul 20242 Aug 2024

Publication series

NameACM International Conference Proceeding Series

Conference

Conference19th International Conference on Availability, Reliability and Security, ARES 2024
Country/TerritoryAustria
CityVienna
Period30/07/242/08/24

Keywords

  • attack graph
  • cyber security
  • cyber security assessment
  • simulation
  • synthetic data generation
  • threat modelling

Fingerprint

Dive into the research topics of 'A Multi-layer Approach through Threat Modelling and Attack Simulation for Enhanced Cyber Security Assessment'. Together they form a unique fingerprint.

Cite this