|国家预印本平台
首页|Simulation in Cybersecurity: Understanding Techniques, Applications, and Goals

Simulation in Cybersecurity: Understanding Techniques, Applications, and Goals

Simulation in Cybersecurity: Understanding Techniques, Applications, and Goals

来源:Arxiv_logoArxiv
英文摘要

Modeling and simulation are widely used in cybersecurity research to assess cyber threats, evaluate defense mechanisms, and analyze vulnerabilities. However, the diversity of application areas, the variety of cyberattacks scenarios, and the differing objectives of these simulations makes it difficult to identify methodological trends. Existing reviews often focus on specific modeling techniques or application domains, making it challenging to analyze the field as a whole. To address these limitations, we present a comprehensive review of the current state of the art, classifying the selected papers based on four dimensions: the application domain, the types of cyber threats represented, the simulation techniques employed, and the primary goals of the simulation. The review discusses the strengths and limitations of different approaches, identifies which cyber threats are the most suited for simulation-based investigations, and analyzes which modeling paradigms are most appropriate for specific cybersecurity challenges.

Luca Serena、Gabriele D'Angelo、Stefano Ferretti、Moreno Marzolla

计算技术、计算机技术

Luca Serena,Gabriele D'Angelo,Stefano Ferretti,Moreno Marzolla.Simulation in Cybersecurity: Understanding Techniques, Applications, and Goals[EB/OL].(2025-08-08)[2025-08-24].https://arxiv.org/abs/2508.06106.点此复制

评论