Object-oriented simulation with hierarchical, modular models: intelligent agents and endomorphic systems
Model-based reasoning methodology using the symbolic DEVS simulation
Transactions of the Society for Computer Simulation International
The process of network security: designing and managing a safe network
The process of network security: designing and managing a safe network
Intrusion Detection
Theory of Modeling and Simulation
Theory of Modeling and Simulation
Network Security Modeling and Cyber Attack Simulation Methodology
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
SECUSIM: A Tool for the Cyber-Attack Simulation
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Hi-index | 0.00 |
The major objective of this paper is to propose the automated cyber-attack scenario generation methodology based on the symbolic simulation environment. Information Assurance is to assure the reliability and availability of information by preventing from attack. Cyber-attack simulation is one of noticeable methods for analyzing vulnerabilities in the information assurance field, which requires variety of attack scenarios. To do this, we have adopted the symbolic simulation that has extended a conventional numeric simulation. This study can 1) not only generate conventional cyber-attack scenarios but 2) generate cyber-attack scenarios still unknown, and 3) be applied to establish the appropriate defense strategies by analyzing generated cyber-attack. Simulation test performed on sample network system will illustrate our techniques.