Linux-Based system modelling for cyber-attack simulation

  • Authors:
  • Jang-Se Lee;Jung-Rae Jung;Jong-Sou Park;Sung-Do Chi

  • Affiliations:
  • The Division of Information Technology Engineering, Korea Maritime University, Korea;Cooperation of appeal telecom, Korea;The Department of Computer Engineering, Hangkong University, Korea;The Department of Computer Engineering, Hangkong University, Korea

  • Venue:
  • AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

The major objective of this paper is to describe modeling on the linux-based system for simulation of cyber attacks. To do this, we have analyzed the Linux system from a security viewpoint and proposed the Linux-based system model using the DEVS modeling and simulation environment. Unlike conventional researches, we are able to i) reproduce the detail behavior of cyber-attack, ii) analyze concrete changes of system resource according to a cyber-attack and iii) expect that this would be a cornerstone for more practical application researches (generating cyber-attack scenarios, analyzing vulnerability and examining countermeasures, etc.) of security simulation. Several simulation tests performed on sample network system will illustrate our techniques.