Abstract

This paper aims to show the major role means of protection play for strengthening the cybersecurity of critical transport infrastructure by using the advanced method of simulation modelling. The simulation model of a Traffic Control Centre (TTC) of an urban Automobile Transport System (ATS) is created by the author in the Riverbed Modeler Academic Edition 17.5 computer networks simulation system and is exposed to the impact of a Denial-of-Service attack. In addition, logical conclusions have been made on the basis of the experimental results obtained and evaluated by comparative analysis with results from analogous previous studies.

Highlights

  • The focus of the present research is on the measures of strengthening and maintaining a secure, operational and sustainable critical transport infrastructure and in particular an urban Automobile Transport System (ATS) by building a reliable cyber protection of its Traffic Control Centre (TCC).For this purpose, the author has studied and analyzed various advanced simulation environments based on agent-based modelling such as NetLogo [1], Aimsun 8.0, Cisco Packet Tracer and Riverbed Modeler

  • This paper aims to show the major role means of protection play for strengthening the cybersecurity of critical transport infrastructure by using the advanced method of simulation modelling

  • This research is an example of applying simulation modelling for solving problems related to cybersecurity of critical transport infrastructure

Read more

Summary

Introduction

The focus of the present research is on the measures of strengthening and maintaining a secure, operational and sustainable critical transport infrastructure and in particular an urban Automobile Transport System (ATS) by building a reliable cyber protection of its Traffic Control Centre (TCC) For this purpose, the author has studied and analyzed various advanced simulation environments based on agent-based modelling such as NetLogo [1], Aimsun 8.0, Cisco Packet Tracer and Riverbed Modeler. One of the main differences between the two methods is that penetration tests must be implemented in "virtual machines" with vulnerable applications in order to safely test different techniques that target a system breakthrough, using publicly available tools [3] This can be considered as an advantage of simulation modelling as compared to penetration tests, because the direct installation of simulation software on a personal computer does not pose a threat of infection. Penetration testing is usually conducted on site at the institution or organization that has commissioned it and this causes a disruption of its normal functioning during this process

Means of protection against cyber attacks based on the potential vulnerabilities
With a firewall
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.