kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Two decades of cyberattack simulations: A systematic literature review
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering. KTH, School of Electrical Engineering and Computer Science (EECS), Centres, Centre for Cyber Defence and Information Security CDIS. (Software Systems Architecture and Security)ORCID iD: 0000-0002-6762-3662
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering. (Software Systems Architecture and Security)ORCID iD: 0000-0003-3089-3885
2022 (English)In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 116, p. 102681-102681, article id 102681Article in journal (Refereed) Published
Abstract [en]

Cyberattack simulations appear across multiple computer security domains and are interpreted in many different but equally viable ways. However, this makes the topic appear fragmented and inconsistent, making it challenging to identify and communicate relevant research. Therefore, this article contributes to a unified baseline by presenting the results of a systematic literature review. The review targeted attack simulations published between 1999 and 2019, specifically those exploring which specific steps result in successful attacks. The search initially produced 647 articles, later reduced to 11 key contributions. Despite being scattered across application domains, their general aims, contributions, and problem statements were remarkably similar. This was despite them generally not citing each other or a common body of work. However, the attack simulations differed in implementation details, such as modeling techniques, attacker decision-making, and how time is incorporated. How to construct a fully unified view of the entire topic is still somewhat unclear, particularly from the 11 articles. However, the results presented here should help orient practitioners and researchers interested in attack simulations regarding both present and future work. Particularly since, despite the seemingly implausible sample, the cumulative evidence suggests that attack simulations have yet to be pursued as a distinct research topic.

Place, publisher, year, edition, pages
Elsevier BV , 2022. Vol. 116, p. 102681-102681, article id 102681
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-310603DOI: 10.1016/j.cose.2022.102681ISI: 000793260300002Scopus ID: 2-s2.0-85126287111OAI: oai:DiVA.org:kth-310603DiVA, id: diva2:1649900
Funder
EU, Horizon Europe, 832907VinnovaSwedish Energy Agency
Note

QC 20220406

Available from: 2022-04-05 Created: 2022-04-05 Last updated: 2022-11-07Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Engström, ViktorLagerström, Robert

Search in DiVA

By author/editor
Engström, ViktorLagerström, Robert
By organisation
Network and Systems EngineeringCentre for Cyber Defence and Information Security CDIS
In the same journal
Computers & security (Print)
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 162 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf