DeepAI AI Chat
Log In Sign Up

Simulation-Based Cyber Data Collection Efficacy

by   David Thaw, et al.

Building upon previous research in honeynets and simulations, we present efforts from a two-and-a-half-year study using a representative simulation to collect cybersecurity data. Unlike traditional honeypots or honeynets, our experiment utilizes a full-scale operational network to model a small business environment. The simulation uses default security configurations to defend the network, testing the assumption that given standard security baseline, devices networked to the public Internet will necessarily be hacked. Given network activity appropriate for its context, results support the conclusion that no actors where able to break in, despite only default security settings.


page 1

page 2

page 3


The Good, The Bad and The Missing: A Narrative Review of Cyber-security Implications for Australian Small Businesses

Small businesses (0-19 employees) are becoming attractive targets for cy...

On the Scalability of Big Data Cyber Security Analytics Systems

Big Data Cyber Security Analytics (BDCA) systems use big data technologi...

Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review

The growing demand for computer security and the cyberization trend are ...

The efficacy potential of cyber security advice as presented in news articles

Cyber security advice is a broad church: it is thematically expansive, c...

Digital Blues: An Investigation into the Use of Bluetooth Protocols

The proliferation of Bluetooth mobile device communications into all asp...