Multifacetted modelling and discrete event simulation
Multifacetted modelling and discrete event simulation
Object-oriented simulation with hierarchical, modular models: intelligent agents and endomorphic systems
The process of network security: designing and managing a safe network
The process of network security: designing and managing a safe network
Intrusion Detection
Hacking Linux Exposed
Theory of Modeling and Simulation
Theory of Modeling and Simulation
Network Security Modeling and Cyber Attack Simulation Methodology
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Cyber attack modeling and simulation for network security analysis
Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come
Hi-index | 0.00 |
The major objective of this paper is to describe modeling on the linux-based system for simulation of cyber attacks. To do this, we have analyzed the Linux system from a security viewpoint and proposed the Linux-based system model using the DEVS modeling and simulation environment. Unlike conventional researches, we are able to i) reproduce the detail behavior of cyber-attack, ii) analyze concrete changes of system resource according to a cyber-attack and iii) expect that this would be a cornerstone for more practical application researches (generating cyber-attack scenarios, analyzing vulnerability and examining countermeasures, etc.) of security simulation. Several simulation tests performed on sample network system will illustrate our techniques.