Object-oriented simulation with hierarchical, modular models: intelligent agents and endomorphic systems
A process control approach to cyber attack detection
Communications of the ACM
Theory of Modeling and Simulation
Theory of Modeling and Simulation
DEVS Simulation of distributed intrusion detection systems
Transactions of the Society for Computer Simulation International - Recent advances in DEVS Methodology--part I
Survivability: Protecting Your Critical Systems
IEEE Internet Computing
Vulnerability Assessment Simulation for Information Infrastructure Protection
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
System specification based network modeling for survivability testing simulation
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Hi-index | 0.00 |
To construct the ITS(Intrusion Tolerance System), we should concern not only the FTS(Fault Tolerant System) requirements but also intrusion and vulnerability factors. But, in the ITS, we can not take into account the intrusion and vulnerability as they are, because the characteristics and pattern of them is unknown. So, we suggest vulnerability analysis method that enable ITS to know the pattern of vulnerability exploitation more specifically. We make use of the atomic vulnerability concept to analyze the vulnerability in DNS system, and show how to make use of the analysis result as monitoring factors in our DNS ITS system. Also, this analysis result is used in modeling and simulation to see the dynamics of computer network for vulnerability and external malicious attack. This paper shows simulation execution examples making use of the vulnerability analysis result.