Software for uniform random number generation: distinguishing the good and the bad
Proceedings of the 33nd conference on Winter simulation
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
An Object-Oriented Random-Number Package with Many Long Streams and Substreams
Operations Research
Worm propagation modeling and analysis under dynamic quarantine defense
Proceedings of the 2003 ACM workshop on Rapid malcode
On the performance of internet worm scanning strategies
Performance Evaluation
A preliminary study of optimal splitting for rare-event simulation
Proceedings of the 40th Conference on Winter Simulation
Cyberattacks: Why, What, Who, and How
IT Professional
Cyber War: The Next Threat to National Security and What to Do About It
Cyber War: The Next Threat to National Security and What to Do About It
Simulating network cyber attacks using splitting techniques
Proceedings of the Winter Simulation Conference
Combining simulation allocation and optimal splitting for rare-event simulation optimization
Proceedings of the Winter Simulation Conference
Hi-index | 0.00 |
According to the former counterterrorism czar, Richard A. Clarke (2010), our national infrastructure could be severely damaged in 15 minutes by a cyber attack. A worm attack on an Internet Protocol (IP) network is one type of attack that is possible. Such an attack would result in a non-stationary arrival process of packets on a link in the network. In this paper we present an initial use of our Optimal Splitting Technique for Rare Events (OSTRE) to simulate the congestion imposed by the worm on the link. This initial application is oriented to testing the technique in this dynamic environment and report on its use as compared with conventional simulations.