2022
DOI: 10.1007/978-3-031-19945-5_25
|View full text |Cite
|
Sign up to set email alerts
|

Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…Artificial intelligence algorithms can be taught to recognize common forms of assault and to spot novel ones that have certain traits. Patching security holes, keeping tabs on network traffic, and handling incidents are just some of the mundane responsibilities that may be automated with the help of AI [53,54]. Cybersecurity experts can then devote their time and energy to solving problems that call for their unique set of skills.…”
Section: Ai For Cybersecurity In Generalmentioning
confidence: 99%
“…Artificial intelligence algorithms can be taught to recognize common forms of assault and to spot novel ones that have certain traits. Patching security holes, keeping tabs on network traffic, and handling incidents are just some of the mundane responsibilities that may be automated with the help of AI [53,54]. Cybersecurity experts can then devote their time and energy to solving problems that call for their unique set of skills.…”
Section: Ai For Cybersecurity In Generalmentioning
confidence: 99%
“…Irshad and Siddiqui [Irshad and Siddiqui 2022] developed a mechanism to at-tribute or profile cyber threat actors (CTA) by extracting features from cyber threat intelligence (CTI) reports. They defined a methodology to extract features from unstructured CTI reports by using natural language processing (NLP) techniques and then attributing cyber threat actor by using machine learning algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Regardless of the type of assessment carried out, such as war games [Moumouh et al 2023], penetration testing [Mayukha and Vadivel 2023] or breach attack simulations [Jaber and Fritsch 2023], the results of the execution of your campaigns are presented in reports that will serve as a basis for preparing the action plan to mitigate the weaknesses found. As assessment campaigns perform various procedures that simulate the behavior of known hackers or malware groups in a generalized way.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This is also an era where cyber risks, cyber-attacks and the spread of disinformation are also inevitable. Threat actors are already increasing their capabilities, using artificial intelligence-powered cyber-attacks (Guembea, et al, 2022;Jaber & Fritsch, 2023). There has been a 38% increase in cyber-attacks worldwide in 2022 compared to 2021, with education/research, government/military and healthcare being the most attacked sectors (Check Point Research, 2023).…”
Section: Introductionmentioning
confidence: 99%