Multifacetted modelling and discrete event simulation
Multifacetted modelling and discrete event simulation
Object-oriented simulation with hierarchical, modular models: intelligent agents and endomorphic systems
The process of network security: designing and managing a safe network
The process of network security: designing and managing a safe network
Intrusion Detection
Network Intrusion Detection: An Analyst's Handbook
Network Intrusion Detection: An Analyst's Handbook
SECUSIM: A Tool for the Cyber-Attack Simulation
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
SIMVA: simulation-based network vulnerability analysis system
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
Attacks against computer network: formal grammar-based framework and simulation tool
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Design of intelligent security management system using simulation-based analysis
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Automated cyber-attack scenario generation using the symbolic simulation
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Linux-Based system modelling for cyber-attack simulation
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Effective discovery of intrusion protection strategies
AIS-ADM 2005 Proceedings of the 2005 international conference on Autonomous Intelligent Systems: agents and Data Mining
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Hi-index | 0.00 |
The major objective of this paper is to develop the network security modeling and cyber attack simulation that is able to classify threats, specify attack mechanisms, verify protection mechanisms, and evaluate consequences. To do this, we have employed the advanced modeling and simulation concepts such as System Entity Structure / Model Base framework, DEVS (Discrete Event System Specification) formalism, and experimental frame concept underlying the object-oriented S/W environment. Our approach is to show the difference from others in that (i) it supports a hierarchical and modular modeling environment, (ii) it generates the command-level behavior of cyber attack scenario, (iii) it provides an efficient model building environment based on the experimental frame concept, and (iv) it supports the vulnerability analysis of given node on the network. Simulation test performed on sample network system will illustrate our techniques.