Simulation in Cybersecurity: Understanding Techniques, Applications, and Goals Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2508.06106
Modeling and simulation are widely used in cybersecurity research to assess cyber threats, evaluate defense mechanisms, and analyze vulnerabilities. However, the diversity of application areas, the variety of cyberattacks scenarios, and the differing objectives of these simulations makes it difficult to identify methodological trends. Existing reviews often focus on specific modeling techniques or application domains, making it challenging to analyze the field as a whole. To address these limitations, we present a comprehensive review of the current state of the art, classifying the selected papers based on four dimensions: the application domain, the types of cyber threats represented, the simulation techniques employed, and the primary goals of the simulation. The review discusses the strengths and limitations of different approaches, identifies which cyber threats are the most suited for simulation-based investigations, and analyzes which modeling paradigms are most appropriate for specific cybersecurity challenges.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2508.06106
- https://arxiv.org/pdf/2508.06106
- OA Status
- green
- OpenAlex ID
- https://openalex.org/W4415192593
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4415192593Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2508.06106Digital Object Identifier
- Title
-
Simulation in Cybersecurity: Understanding Techniques, Applications, and GoalsWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-08-08Full publication date if available
- Authors
-
Luca Serena, Gabriele D’Angelo, Stefano Ferretti, Moreno MarzollaList of authors in order
- Landing page
-
https://arxiv.org/abs/2508.06106Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2508.06106Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2508.06106Direct OA link when available
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W4415192593 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2508.06106 |
| ids.doi | https://doi.org/10.48550/arxiv.2508.06106 |
| ids.openalex | https://openalex.org/W4415192593 |
| fwci | |
| type | preprint |
| title | Simulation in Cybersecurity: Understanding Techniques, Applications, and Goals |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11195 |
| topics[0].field.id | https://openalex.org/fields/18 |
| topics[0].field.display_name | Decision Sciences |
| topics[0].score | 0.9818000197410583 |
| topics[0].domain.id | https://openalex.org/domains/2 |
| topics[0].domain.display_name | Social Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1803 |
| topics[0].subfield.display_name | Management Science and Operations Research |
| topics[0].display_name | Simulation Techniques and Applications |
| topics[1].id | https://openalex.org/T10734 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9375 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Information and Cyber Security |
| topics[2].id | https://openalex.org/T10400 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9035999774932861 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Network Security and Intrusion Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2508.06106 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2508.06106 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2508.06106 |
| locations[1].id | doi:10.48550/arxiv.2508.06106 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2508.06106 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5004215838 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-7951-4682 |
| authorships[0].author.display_name | Luca Serena |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Serena, Luca |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5108167047 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-3690-6651 |
| authorships[1].author.display_name | Gabriele D’Angelo |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | D'Angelo, Gabriele |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5053850873 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Stefano Ferretti |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Ferretti, Stefano |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5001098303 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-2151-5287 |
| authorships[3].author.display_name | Moreno Marzolla |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Marzolla, Moreno |
| authorships[3].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2508.06106 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-15T00:00:00 |
| display_name | Simulation in Cybersecurity: Understanding Techniques, Applications, and Goals |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T11195 |
| primary_topic.field.id | https://openalex.org/fields/18 |
| primary_topic.field.display_name | Decision Sciences |
| primary_topic.score | 0.9818000197410583 |
| primary_topic.domain.id | https://openalex.org/domains/2 |
| primary_topic.domain.display_name | Social Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1803 |
| primary_topic.subfield.display_name | Management Science and Operations Research |
| primary_topic.display_name | Simulation Techniques and Applications |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2508.06106 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2508.06106 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2508.06106 |
| primary_location.id | pmh:oai:arXiv.org:2508.06106 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2508.06106 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2508.06106 |
| publication_date | 2025-08-08 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 63, 71 |
| abstract_inverted_index.To | 65 |
| abstract_inverted_index.as | 62 |
| abstract_inverted_index.in | 6 |
| abstract_inverted_index.it | 38, 56 |
| abstract_inverted_index.of | 22, 27, 34, 74, 78, 94, 106, 116 |
| abstract_inverted_index.on | 48, 86 |
| abstract_inverted_index.or | 52 |
| abstract_inverted_index.to | 9, 40, 58 |
| abstract_inverted_index.we | 69 |
| abstract_inverted_index.The | 109 |
| abstract_inverted_index.and | 1, 16, 30, 102, 114, 130 |
| abstract_inverted_index.are | 3, 123, 135 |
| abstract_inverted_index.for | 127, 138 |
| abstract_inverted_index.the | 20, 25, 31, 60, 75, 79, 82, 89, 92, 98, 103, 107, 112, 124 |
| abstract_inverted_index.art, | 80 |
| abstract_inverted_index.four | 87 |
| abstract_inverted_index.most | 125, 136 |
| abstract_inverted_index.used | 5 |
| abstract_inverted_index.based | 85 |
| abstract_inverted_index.cyber | 11, 95, 121 |
| abstract_inverted_index.field | 61 |
| abstract_inverted_index.focus | 47 |
| abstract_inverted_index.goals | 105 |
| abstract_inverted_index.makes | 37 |
| abstract_inverted_index.often | 46 |
| abstract_inverted_index.state | 77 |
| abstract_inverted_index.these | 35, 67 |
| abstract_inverted_index.types | 93 |
| abstract_inverted_index.which | 120, 132 |
| abstract_inverted_index.areas, | 24 |
| abstract_inverted_index.assess | 10 |
| abstract_inverted_index.making | 55 |
| abstract_inverted_index.papers | 84 |
| abstract_inverted_index.review | 73, 110 |
| abstract_inverted_index.suited | 126 |
| abstract_inverted_index.whole. | 64 |
| abstract_inverted_index.widely | 4 |
| abstract_inverted_index.address | 66 |
| abstract_inverted_index.analyze | 17, 59 |
| abstract_inverted_index.current | 76 |
| abstract_inverted_index.defense | 14 |
| abstract_inverted_index.domain, | 91 |
| abstract_inverted_index.present | 70 |
| abstract_inverted_index.primary | 104 |
| abstract_inverted_index.reviews | 45 |
| abstract_inverted_index.threats | 96, 122 |
| abstract_inverted_index.trends. | 43 |
| abstract_inverted_index.variety | 26 |
| abstract_inverted_index.Existing | 44 |
| abstract_inverted_index.However, | 19 |
| abstract_inverted_index.Modeling | 0 |
| abstract_inverted_index.analyzes | 131 |
| abstract_inverted_index.domains, | 54 |
| abstract_inverted_index.evaluate | 13 |
| abstract_inverted_index.identify | 41 |
| abstract_inverted_index.modeling | 50, 133 |
| abstract_inverted_index.research | 8 |
| abstract_inverted_index.selected | 83 |
| abstract_inverted_index.specific | 49, 139 |
| abstract_inverted_index.threats, | 12 |
| abstract_inverted_index.different | 117 |
| abstract_inverted_index.differing | 32 |
| abstract_inverted_index.difficult | 39 |
| abstract_inverted_index.discusses | 111 |
| abstract_inverted_index.diversity | 21 |
| abstract_inverted_index.employed, | 101 |
| abstract_inverted_index.paradigms | 134 |
| abstract_inverted_index.strengths | 113 |
| abstract_inverted_index.identifies | 119 |
| abstract_inverted_index.objectives | 33 |
| abstract_inverted_index.scenarios, | 29 |
| abstract_inverted_index.simulation | 2, 99 |
| abstract_inverted_index.techniques | 51, 100 |
| abstract_inverted_index.application | 23, 53, 90 |
| abstract_inverted_index.approaches, | 118 |
| abstract_inverted_index.appropriate | 137 |
| abstract_inverted_index.challenges. | 141 |
| abstract_inverted_index.challenging | 57 |
| abstract_inverted_index.classifying | 81 |
| abstract_inverted_index.dimensions: | 88 |
| abstract_inverted_index.limitations | 115 |
| abstract_inverted_index.mechanisms, | 15 |
| abstract_inverted_index.simulation. | 108 |
| abstract_inverted_index.simulations | 36 |
| abstract_inverted_index.cyberattacks | 28 |
| abstract_inverted_index.limitations, | 68 |
| abstract_inverted_index.represented, | 97 |
| abstract_inverted_index.comprehensive | 72 |
| abstract_inverted_index.cybersecurity | 7, 140 |
| abstract_inverted_index.methodological | 42 |
| abstract_inverted_index.investigations, | 129 |
| abstract_inverted_index.simulation-based | 128 |
| abstract_inverted_index.vulnerabilities. | 18 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile |