Skip to main content

Two Complementary Network Modeling and Simulation Approaches to Aid in Understanding Advanced Cyber Threats

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 501))

Abstract

This paper describes two complementary approaches to modeling and simulation (M&S) of sophisticated malware attacks for their use in understanding and preparing for potential threats. Modern malware operates at multiple scales, and successfully defending against these attacks requires the ability to understand the effects of decisions across this range. We present two types of M&S frameworks that differ in fidelity and scalability. The first is a low fidelity, scalable approach for representing and studying the spread of malware in a large network at a macro scale. The network is both modelled and simulated in ns-3, a discrete event simulation tool typically used for protocol exploration and traffic monitoring that supports the simulation of tens of thousands of nodes. The second type of simulation is a higher-fidelity, micro scale approach that includes nodes that closely emulate the behavior of actual computer systems and may include real hardware and software. Ns-3 allows outside networks to interact in real-time with ns-3. This enables the combination of the network simulation environment with real and virtual machines to allow detailed observation of the ways in which a hypothetical advanced persistent threat would play out in a small subnetwork. The interface between the ns-3 simulation, attack framework (e.g. Metasploit), and the real and virtual nodes is managed by a controller that also supplies configuration, business logic and results logging. We present use cases for both simulation types, showing how each approach can be used in the analysis of malware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cohen, F.: Simulating cyber attacks, defences, and consequences. Comput. Secur. 18, 479–518 (1999)

    Article  Google Scholar 

  2. Henderson, T.R., Lacage, M., Riley, G.F., Dowell, C., Kopena, J.B.: Network simulations with the ns-3 simulator. SIGCOMM Demonstr. 14, (2008)

    Google Scholar 

  3. Macal, C.M., North, M.J.: Tutorial on agent-based modeling and simulation. In: Proceedings of the 37th Conference on Winter Simulation, pp. 2–15 (2005)

    Google Scholar 

  4. Riley, G.F., Sharif, M., Lee, W.: Simulating internet worms. In: Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004. (MASCOTS 2004). The IEEE Computer Society’s 12th Annual International Symposium on Proceedings, pp. 268–274 (2004)

    Google Scholar 

  5. Davis, J., Magrath, S.: A Survey of Cyber Ranges and Testbeds (2013)

    Google Scholar 

  6. Dagon, D., Zou, C.C., Lee, W.: Modeling botnet propagation using time zones. In: NDSS, pp. 2–13 (2006)

    Google Scholar 

  7. Dagon, D., Gu, G., Lee, C.P., Lee, W.: A taxonomy of botnet structures. In: Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, pp. 325–339 (2007)

    Google Scholar 

  8. Kotenko, I., Konovalov, A., Shorov, A.: Agent-based modeling and simulation of botnets and botnet defense. In: Czosseck, C., Podins, K. (eds.) Conference on Cyber Conflict, pp. 21–44. CCD COE Publications, Tallinn (2010)

    Google Scholar 

  9. Logsdon, J., Nash, D., Barnes, M.: One semi-automated forces (OneSAF) capabilities, architecture, and processes, http://handle.dtic.mil/100.2/ADA501150, (2008)

  10. Varshney, M., Pickett, K., Bagrodia, R.: A live-virtual-constructive (LVC) framework for cyber operations test, evaluation and training. In: Military Communications Conference, 2011-MILCOM 2011, pp. 1387–1392 (2011)

    Google Scholar 

  11. Schneier, B.: Attack trees. Dr. Dobb’s J. 24, 21–29 (1999)

    Google Scholar 

  12. Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Information Security and Cryptology-ICISC 2005. Springer, Berlin, pp. 186–198 (2006)

    Google Scholar 

  13. Camtepe, S.A., Yener, B.: Modeling and detection of complex attacks. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007, pp. 234–243. IEEE (2007)

    Google Scholar 

  14. Mishra, S., Kant, K., Yadav, R.S.: Multi tree view of complex attack–stuxnet. In: Advances in Computing and Information Technology. Springer, Berlin, pp. 171–188 (2012)

    Google Scholar 

  15. Eom, J., Han, Y.-J., Park, S.-H., Chung, T.-M.: Active cyber attack model for network system’s vulnerability assessment. In: International Conference on Information Science and Security, 2008. ICISS, pp. 153–158 (2008)

    Google Scholar 

  16. Cheung, S., Lindqvist, U., Fong, M.W.: Modeling multistep cyber attacks for scenario recognition. In: Proceedings DARPA Information Survivability Conference And Exposition, 2003, pp. 284–292 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stephen Lee-Urban .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Lee-Urban, S., Whitaker, E., Riley, M., Trewhitt, E. (2016). Two Complementary Network Modeling and Simulation Approaches to Aid in Understanding Advanced Cyber Threats. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. Advances in Intelligent Systems and Computing, vol 501. Springer, Cham. https://doi.org/10.1007/978-3-319-41932-9_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41932-9_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41931-2

  • Online ISBN: 978-3-319-41932-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics