Abstract
A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, network security simulations aim at damage estimation of incidents in small-size networks or performance analysis of information protection systems. However, a simulator is needed to handle large-size networks since attacks in these days are based on large-size global networks such as the Internet. The existing simulators have limitations for simulating large-scale Internet attacks. In this paper, a scalable, ordered scenario-based network security simulator is proposed. Our proposed simulator is implemented by expanding the SSFNet program to client-server architectures. A network security scenario is applied to test effectiveness of our proposed simulator.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Deraison, R.: Nessus Scanner, http://www.nessus.org/
Internet Security Systems Internet Scanner, http://www.iss.net/
Farmer, D., Spafford, E.: The cops security checker system. In: Proceedings of the Summer Usenix Conference (1990)
N-Stealth: Vulnerability-Assessment Product, http://www.nstalker.com/nstealth/
Householder, A., Houle, K., Dougherty, C.: Computer attack trends challenge inernet security. In: Proceedings of the IEEE Symposium on Security and Privacy (2002)
McDermott, J.P.: Attack net penetration testing. In: Proceedings of the 2000 workshop on New security paradigms, pp. 15–21. ACM Press, New York (2000)
Steffan, J., Schumacher, M.: Collaborative attack modeling. In: Proceedings of the 17th symposium on Proceedings of the 2002 ACM symposium on applied computing, pp. 253–259. ACM Press, New York (2002)
Lee, C.W., Im, E.G., Chang, B.H., Kim, D.K.: Hierarchical state transition graph for internet attack scenarios. In: Proceedings of the International Conference on Information Networking 2003 (2003)
Mostow, J.R., Roberts, J.D., Bott, J.: Integration of an Internet Attack Simulator in an HLA Environment. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)
Welch, D., Conti, G., Marin, J.: A framework for an information warfare simulation. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)
Smith, R., Harya, B.: Firewall placement in a large network topology. In: Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computing Systems (1997)
Breslau, L., Estrin, D., Fall, K., Floyd, S., Heidemann, J., Helmy, A., Huang, P., McCanne, S., Varadhan, K., Xu, Y., Yu, H.: Advances in network simulation. IEEE Computer 33, 59–67 (2000), Expanded version available as USC TR 99-702b at, http://www.isi.edu/~johnh/PAPERS/Bajaj99a.html
Technology, O.: Opnet modeler (March 2001)
Schneier, B.: Attack tree secrets and lies, pp. 318–333. John Wiley and Sons, Chichester (2000)
SSF Research Network. Domain Modeling Language Reference Manual, http://www.ssfnet.org/SSFdocs/dmlReference.html
Wagner, A., Dubendorfer, T., Plattner, B., Hiestand, R.: Experiences with worm propagation simulations, pp. 33–41. ACM, New York (2003)
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the slammer worm. IEEE Security & Privacy 1, 33–39 (2003)
SSF Research Network. Scalable Simulation Framework, http://www.ssfnet.org/homePage.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yun, J.B., Park, E.K., Im, E.G., In, H.P. (2005). A Scalable, Ordered Scenario-Based Network Security Simulator. In: Baik, DK. (eds) Systems Modeling and Simulation: Theory and Applications. AsiaSim 2004. Lecture Notes in Computer Science(), vol 3398. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30585-9_54
Download citation
DOI: https://doi.org/10.1007/978-3-540-30585-9_54
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24477-6
Online ISBN: 978-3-540-30585-9
eBook Packages: Computer ScienceComputer Science (R0)