Controlling high bandwidth aggregates in the network
ACM SIGCOMM Computer Communication Review
On the accuracy of MANET simulators
Proceedings of the second ACM international workshop on Principles of mobile computing
TOSSIM: accurate and scalable simulation of entire TinyOS applications
Proceedings of the 1st international conference on Embedded networked sensor systems
WNS2 '06 Proceeding from the 2006 workshop on ns-2: the IP network simulator
An overview of the OMNeT++ simulation environment
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
Realistic simulation environments for IP-based networks
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
Ponder2 - A Policy Environment for Autonomous Pervasive Systems
POLICY '08 Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks
Distack -- A Framework for Anomaly-Based Large-Scale Attack Detection
SECURWARE '08 Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies
Large-scale evaluation of distributed attack detection
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
Computer Networks: The International Journal of Computer and Telecommunications Networking
A performance comparison of recent network simulators
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Strategies for network resilience: capitalising on policies
AIMS'10 Proceedings of the Mechanisms for autonomous management of networks and services, and 4th international conference on Autonomous infrastructure, management and security
Security and management policy specification
IEEE Network: The Magazine of Global Internetworking
Towards the simulation of energy-efficient resilience management
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques
Resilience strategies for networked malware detection and remediation
NSS'12 Proceedings of the 6th international conference on Network and System Security
Hi-index | 0.00 |
Networks must be resilient to challenges such as malicious attacks or network overload and adapt their operation in an autonomous manner. Network simulations enable the testing of complex network scenarios (which would be difficult to emulate using actual hardware) in an inexpensive manner. However, it is difficult to evaluate resilience strategies that involve the interplay between a number of detection and remediation mechanisms that must be activated on demand according to events observed in the network (as opposed to hardcoded protocols). In this paper we propose the notion of a policy-based resilience simulator based on the integration of a network simulator and a policy management framework. This permits the evaluation of resilience strategies consisting of mechanisms whose behaviour can be adapted during runtime -- e.g. setting flags, dropping connections, triggering or stopping monitoring sessions, etc. We employ policies to specify the required adaptations, which are de-coupled from the hard-wired implementations of the simulated components, according to conditions observed during run-time in the simulation. We can thus observe how real policies affect the operation and the behaviour of simulated components, and then evaluate the effectiveness of resilience strategies before they are deployed in the network infrastructure.