Operations Research

Specifying Functional Requirements for Simulating Professional Offensive Cyber Operations

ABSTRACT

Several nations are acquiring the capability for conducting professional offensive cyber operations to fight wars and combat crime and terrorism. They need to know how the attack process works, what resources are required, and how to command and control operations. Simulation is a powerful technology for gaining understanding about such issues. This article presents the functional requirements specification for an agent-based simulator of professional offensive cyber operations in a networked environment. Requirements cover the simulation infrastructure, including time handling, stochastic behaviour, modelling representation, interfacing, and simulation control. Cyber-specific use cases are grouped by stakeholder and phase of operation.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com