The Mathematics of Infectious Diseases
SIAM Review
Software for uniform random number generation: distinguishing the good and the bad
Proceedings of the 33nd conference on Winter simulation
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
Simulation Budget Allocation for Further Enhancing theEfficiency of Ordinal Optimization
Discrete Event Dynamic Systems
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
An Object-Oriented Random-Number Package with Many Long Streams and Substreams
Operations Research
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations
MASCOTS '02 Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
On the performance of internet worm scanning strategies
Performance Evaluation
The impact of stochastic variance on worm propagation and detection
Proceedings of the 4th ACM workshop on Recurring malcode
Splitting for rare-event simulation
Proceedings of the 38th conference on Winter simulation
Efficient simulation of Internet worms
ACM Transactions on Modeling and Computer Simulation (TOMACS)
A preliminary study of optimal splitting for rare-event simulation
Proceedings of the 40th Conference on Winter Simulation
Cyber War: The Next Threat to National Security and What to Do About It
Cyber War: The Next Threat to National Security and What to Do About It
Simulating non-stationary congestion systems using splitting with applications to cyber security
Proceedings of the Winter Simulation Conference
Hi-index | 0.00 |
As a result of potential damage to our national infrastructure due to cyber attacks, a number of cyber-security bills have been introduced in Congress and a National Strategy for Trusted Identities in Cyberspace has been developed by the White House; a component of this strategy is the development of models to assess risks due to cyber incidents. A worm attack on a network is one type of attack that is possible. The simulation of rare events, such as the occurrence of a catastrophic worm attack, is impractical without special simulation techniques. In this paper we present an application of splitting methods to estimate rare-event probabilities associated with the propagation of a worm through a network. We explore the sensitivity of the benefits of splitting methods, as compared to standard simulation, to the rarity of the event and the level function used.