Simulation-Based Cyber Data Collection Efficacy

David Thaw,Bret Barkley,Gerry Bella,Carrie Gardner
DOI: https://doi.org/10.48550/arXiv.1905.09336
2019-05-22
Cryptography and Security
Abstract:Building upon previous research in honeynets and simulations, we present efforts from a two-and-a-half-year study using a representative simulation to collect cybersecurity data. Unlike traditional honeypots or honeynets, our experiment utilizes a full-scale operational network to model a small business environment. The simulation uses default security configurations to defend the network, testing the assumption that given standard security baseline, devices networked to the public Internet will necessarily be hacked. Given network activity appropriate for its context, results support the conclusion that no actors where able to break in, despite only default security settings.
What problem does this paper attempt to address?