Simulation-Based Cyber Data Collection Efficacy [article]

David Thaw, Bret Barkley, Gerry Bella, Carrie Gardner
2019 arXiv   pre-print
Building upon previous research in honeynets and simulations, we present efforts from a two-and-a-half-year study using a representative simulation to collect cybersecurity data. Unlike traditional honeypots or honeynets, our experiment utilizes a full-scale operational network to model a small business environment. The simulation uses default security configurations to defend the network, testing the assumption that given standard security baseline, devices networked to the public Internet
more » ... necessarily be hacked. Given network activity appropriate for its context, results support the conclusion that no actors where able to break in, despite only default security settings.
arXiv:1905.09336v1 fatcat:3rc3hmnqszdvbd74zwtax3v36y