Cyber attack modeling and simulation for network security analysis

  • Authors:
  • Michael E. Kuhl;Jason Kistner;Kevin Costantini;Moises Sudit

  • Affiliations:
  • Rochester Institute of Technology, Rochester, NY;Rochester Institute of Technology, Rochester, NY;Rochester Institute of Technology, Rochester, NY;University at Buffalo, Buffalo, NY

  • Venue:
  • Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming. As an alternative, in this paper, we present a simulation modeling approach to represent computer networks and intrusion detection systems (IDS) to efficiently simulate cyber attack scenarios. The outcome of the simulation model is a set of IDS alerts that can be used to test and evaluate cyber security systems. In particular, the simulation methodology is designed to test information fusion systems for cyber security that are under development.