Afficher la notice abrégée

dc.rights.licenseopenen_US
dc.contributor.authorKOÏTA, Moussa
dc.contributor.authorDIAGANA, Youssouf M.
dc.contributor.authorMAIGA, Oumar
hal.structure.identifierLaboratoire de l'intégration, du matériau au système [IMS]
dc.contributor.authorTRAORE, Mamadou Kaba
IDREF: 112136893
dc.date.accessioned2022-11-21T13:52:27Z
dc.date.available2022-11-21T13:52:27Z
dc.date.issued2022-12-09
dc.identifier.issn1389-1286en_US
dc.identifier.urioai:crossref.org:10.1016/j.comnet.2022.109381
dc.identifier.urihttps://oskar-bordeaux.fr/handle/20.500.12278/170332
dc.description.abstractEnConnected systems through computerized networks are at the heart of the Industry of the future. As they merge physical entities with cyber spaces, they fall under the paradigm of cyber-physical production systems. Cybersecurity is a key challenge for such systems, as they are subject to daily attempts of intruders to gain unauthorized access to their internal resources or to compromise their integrity. The fast increase of new attack strategies requires the rapid design and assessment of new defense strategies. It entails a complex, error-prone and time-consuming process, including the clear specification of the attack and defense strategies involved, and the design and implementation of the simulation model allowing to evaluate the performances of the defense strategy. This work intends to make such a process transparent to cybersecurity managers by limiting their workload to the sole specification of the characteristics of the system and the logic of the attack and the defense. It provides a generic hybrid simulation framework for flexible evaluation of cybersecurity policies, which is demonstrated on a SYN flooding application. Therefore, the contribution is twofold: (1) The proposed framework offers a high-level environment allowing various experts to collaborate by graphically modeling a given attack strategy and the envisioned defense strategy, without engaging in heavy implementation efforts. Then the framework's executable infrastructure, which combines simulation with machine learning to understanding the interactions between the attackers & the defender, will allow them assessing the performances of these strategies. The proposed framework differs from state-of-the-art cybersecurity simulation environments in its uniqueness to combining the expressive power of a universal simulation modeling formalism with the user-friendliness of a visual simulation tool. Therefore, it offers at one side, a very high modeling flexibility for easy exploration of various cybersecurity strategies, and at the other side, integrated learning capabilities for allowing self-adaptive user-based cybersecurity strategy design. (2) The application demonstrating the framework focuses on the most encountered and still uncontrolled threats in cybersecurity, i.e. the SYN-Flooding based Denial of Service (DoS) attack. The application targeted is not meant to propose yet another SYN flood detection algorithm or to improve the state-of-the-art in that domain, but to prove the framework operationality. The experimental results obtained showcase the ability of the framework to support learning simulation-based SYN flood defense algorithm design and validation.
dc.language.isoENen_US
dc.sourcecrossref
dc.subjectCyber physical production system
dc.subjectCybersecurity
dc.subjectDenial of service
dc.subjectModeling and simulation
dc.subjectHih-level language for systems specification (HILLS)
dc.subjectMachine learning
dc.subjectAnylogic
dc.title.enA generic learning simulation framework to assess security strategies in cyber-physical production systems
dc.typeArticle de revueen_US
dc.identifier.doi10.1016/j.comnet.2022.109381en_US
dc.subject.halSciences de l'ingénieur [physics]en_US
bordeaux.journalComputer Networksen_US
bordeaux.page109381en_US
bordeaux.volume218en_US
bordeaux.hal.laboratoriesIMS : Laboratoire d’Intégration du Matériau au Système - UMR 5218en_US
bordeaux.institutionUniversité de Bordeauxen_US
bordeaux.institutionBordeaux INPen_US
bordeaux.institutionCNRSen_US
bordeaux.peerReviewedouien_US
bordeaux.inpressnonen_US
bordeaux.import.sourcedissemin
hal.identifierhal-03863682
hal.version1
hal.date.transferred2022-11-21T13:52:35Z
hal.exporttrue
workflow.import.sourcedissemin
dc.rights.ccPas de Licence CCen_US
bordeaux.COinSctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.jtitle=Computer%20Networks&rft.date=2022-12-09&rft.volume=218&rft.spage=109381&rft.epage=109381&rft.eissn=1389-1286&rft.issn=1389-1286&rft.au=KO%C3%8FTA,%20Moussa&DIAGANA,%20Youssouf%20M.&MAIGA,%20Oumar&TRAORE,%20Mamadou%20Kaba&rft.genre=article


Fichier(s) constituant ce document

FichiersTailleFormatVue

Il n'y a pas de fichiers associés à ce document.

Ce document figure dans la(les) collection(s) suivante(s)

Afficher la notice abrégée