Designing Simulation Logic of UAV Cyber Operation Using Cyber Security Framework

1Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.

Abstract

Effective education and training of cyber professionals have been proposed as key national tasks to strengthen cybersecurity. However, traditional training does not include modeling and simulation procedure for training cyber operation. This study designs a simulation logic for cyber operations training based on the cyber security framework: identify, protect, detect, respond, and recover. First, we use a random number generation algorithm to generate two random numbers and model them as probabilities. Then we put them into the Lanchester Stochastic model to protect and the threshold adjusted by the anomaly in the detection. The calculated results are categorized with a confusion matrix and reports are generated based on the events that occurred, allowing the trainee to identify that a cyberattack has been attempted on the information system. After the damage is visible in the attack target system, the trainee masters the response and recovery procedures. This can improve cyber professionals' ability to conduct defensive cyber operations and trainees' ability to run an integrated organization. It is expected to be useful in training programs.

Cite

CITATION STYLE

APA

Lee, S., & Kang, D. (2024). Designing Simulation Logic of UAV Cyber Operation Using Cyber Security Framework. IEEE Access, 12, 3488–3498. https://doi.org/10.1109/ACCESS.2023.3349131

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free