A generic learning simulation framework to assess security strategies in cyber-physical production systems
dc.rights.license | open | en_US |
dc.contributor.author | KOÏTA, Moussa | |
dc.contributor.author | DIAGANA, Youssouf M. | |
dc.contributor.author | MAIGA, Oumar | |
hal.structure.identifier | Laboratoire de l'intégration, du matériau au système [IMS] | |
dc.contributor.author | TRAORE, Mamadou Kaba
IDREF: 112136893 | |
dc.date.accessioned | 2022-11-21T13:52:27Z | |
dc.date.available | 2022-11-21T13:52:27Z | |
dc.date.issued | 2022-12-09 | |
dc.identifier.issn | 1389-1286 | en_US |
dc.identifier.uri | oai:crossref.org:10.1016/j.comnet.2022.109381 | |
dc.identifier.uri | https://oskar-bordeaux.fr/handle/20.500.12278/170332 | |
dc.description.abstractEn | Connected systems through computerized networks are at the heart of the Industry of the future. As they merge physical entities with cyber spaces, they fall under the paradigm of cyber-physical production systems. Cybersecurity is a key challenge for such systems, as they are subject to daily attempts of intruders to gain unauthorized access to their internal resources or to compromise their integrity. The fast increase of new attack strategies requires the rapid design and assessment of new defense strategies. It entails a complex, error-prone and time-consuming process, including the clear specification of the attack and defense strategies involved, and the design and implementation of the simulation model allowing to evaluate the performances of the defense strategy. This work intends to make such a process transparent to cybersecurity managers by limiting their workload to the sole specification of the characteristics of the system and the logic of the attack and the defense. It provides a generic hybrid simulation framework for flexible evaluation of cybersecurity policies, which is demonstrated on a SYN flooding application. Therefore, the contribution is twofold: (1) The proposed framework offers a high-level environment allowing various experts to collaborate by graphically modeling a given attack strategy and the envisioned defense strategy, without engaging in heavy implementation efforts. Then the framework's executable infrastructure, which combines simulation with machine learning to understanding the interactions between the attackers & the defender, will allow them assessing the performances of these strategies. The proposed framework differs from state-of-the-art cybersecurity simulation environments in its uniqueness to combining the expressive power of a universal simulation modeling formalism with the user-friendliness of a visual simulation tool. Therefore, it offers at one side, a very high modeling flexibility for easy exploration of various cybersecurity strategies, and at the other side, integrated learning capabilities for allowing self-adaptive user-based cybersecurity strategy design. (2) The application demonstrating the framework focuses on the most encountered and still uncontrolled threats in cybersecurity, i.e. the SYN-Flooding based Denial of Service (DoS) attack. The application targeted is not meant to propose yet another SYN flood detection algorithm or to improve the state-of-the-art in that domain, but to prove the framework operationality. The experimental results obtained showcase the ability of the framework to support learning simulation-based SYN flood defense algorithm design and validation. | |
dc.language.iso | EN | en_US |
dc.source | crossref | |
dc.subject | Cyber physical production system | |
dc.subject | Cybersecurity | |
dc.subject | Denial of service | |
dc.subject | Modeling and simulation | |
dc.subject | Hih-level language for systems specification (HILLS) | |
dc.subject | Machine learning | |
dc.subject | Anylogic | |
dc.title.en | A generic learning simulation framework to assess security strategies in cyber-physical production systems | |
dc.type | Article de revue | en_US |
dc.identifier.doi | 10.1016/j.comnet.2022.109381 | en_US |
dc.subject.hal | Sciences de l'ingénieur [physics] | en_US |
bordeaux.journal | Computer Networks | en_US |
bordeaux.page | 109381 | en_US |
bordeaux.volume | 218 | en_US |
bordeaux.hal.laboratories | IMS : Laboratoire d’Intégration du Matériau au Système - UMR 5218 | en_US |
bordeaux.institution | Université de Bordeaux | en_US |
bordeaux.institution | Bordeaux INP | en_US |
bordeaux.institution | CNRS | en_US |
bordeaux.peerReviewed | oui | en_US |
bordeaux.inpress | non | en_US |
bordeaux.import.source | dissemin | |
hal.identifier | hal-03863682 | |
hal.version | 1 | |
hal.date.transferred | 2022-11-21T13:52:35Z | |
hal.export | true | |
workflow.import.source | dissemin | |
dc.rights.cc | Pas de Licence CC | en_US |
bordeaux.COinS | ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.jtitle=Computer%20Networks&rft.date=2022-12-09&rft.volume=218&rft.spage=109381&rft.epage=109381&rft.eissn=1389-1286&rft.issn=1389-1286&rft.au=KO%C3%8FTA,%20Moussa&DIAGANA,%20Youssouf%20M.&MAIGA,%20Oumar&TRAORE,%20Mamadou%20Kaba&rft.genre=article |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |