Using Camouflaged Cyber Simulations as a Model to Ensure Validity in Cybersecurity Experimentation

by   Carrie Gardner, et al.

Experimental research methods describe standards to safeguard scientific integrity and reputability. These methods have been extensively integrated into traditional scientific disciplines and studied in the philosophy of science. The field of cybersecurity is just beginning to develop preliminary research standards and modeling practices. As such, the science of cybersecurity routinely fails to meet empirical research criteria, such as internal validity, external validity, and construct validity. These standards of experimentation enable the development of metrics, create assurance of experimental soundness, and aid in the generalizability of results. To facilitate such empirical experimentation in cybersecurity, we propose the adaptation of camouflaged cyber simulations as an approach for cybersecurity research. This research tool supports this mechanistic method of experimentation and aids in the construction of general cybersecurity research best practices.


page 1

page 2

page 3

page 4


Experimental Standards for Deep Learning Research: A Natural Language Processing Perspective

The field of Deep Learning (DL) has undergone explosive growth during th...

Knowledge-Base Practicality for Cybersecurity Research Ethics Evaluation

Research ethics in Information and Communications Technology has seen a ...

Simulation as Experiment: An Empirical Critique of Simulation Research on Recommender Systems

Simulation can enable the study of recommender system (RS) evolution whi...

A Silicon Valley Love Triangle: Hiring Algorithms, Pseudo-Science, and the Quest for Auditability

In this paper, we suggest a systematic approach for developing socio-tec...

A Novel Map of Knowledge for Science

With the expansion of scientific research, the number of scientific rese...

Crowd Sensing and Living Lab Outdoor Experimentation Made Easy

Living lab outdoor experimentation using pervasive computing provides ne...

Social shaping of information infrastructure: on being specific about the technology

We are in this paper discussing conceptualisations of the relationship b...