Simulation-Based Cyber Data Collection Efficacy

05/22/2019
by   David Thaw, et al.
0

Building upon previous research in honeynets and simulations, we present efforts from a two-and-a-half-year study using a representative simulation to collect cybersecurity data. Unlike traditional honeypots or honeynets, our experiment utilizes a full-scale operational network to model a small business environment. The simulation uses default security configurations to defend the network, testing the assumption that given standard security baseline, devices networked to the public Internet will necessarily be hacked. Given network activity appropriate for its context, results support the conclusion that no actors where able to break in, despite only default security settings.

READ FULL TEXT

page 1

page 2

page 3

research
09/02/2021

The Good, The Bad and The Missing: A Narrative Review of Cyber-security Implications for Australian Small Businesses

Small businesses (0-19 employees) are becoming attractive targets for cy...
research
11/28/2021

On the Scalability of Big Data Cyber Security Analytics Systems

Big Data Cyber Security Analytics (BDCA) systems use big data technologi...
research
10/11/2020

Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review

The growing demand for computer security and the cyberization trend are ...
research
04/11/2023

The efficacy potential of cyber security advice as presented in news articles

Cyber security advice is a broad church: it is thematically expansive, c...
research
08/06/2018

Digital Blues: An Investigation into the Use of Bluetooth Protocols

The proliferation of Bluetooth mobile device communications into all asp...
research
06/14/2022

Data security as a top priority in the digital world: preserve data value by being proactive and thinking security first

Today, large amounts of data are being continuously produced, collected,...
research
11/19/2022

Practical Challenges And Pitfalls Of Bluetooth Mesh Data Collection Experiments With Esp-32 Microcontrollers

Testing network algorithms in physical environments using real hardware ...

Please sign up or login with your details

Forgot password? Click here to reset