Skip to main content

A Scalable, Ordered Scenario-Based Network Security Simulator

  • Conference paper
Systems Modeling and Simulation: Theory and Applications (AsiaSim 2004)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3398))

Included in the following conference series:

Abstract

A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, network security simulations aim at damage estimation of incidents in small-size networks or performance analysis of information protection systems. However, a simulator is needed to handle large-size networks since attacks in these days are based on large-size global networks such as the Internet. The existing simulators have limitations for simulating large-scale Internet attacks. In this paper, a scalable, ordered scenario-based network security simulator is proposed. Our proposed simulator is implemented by expanding the SSFNet program to client-server architectures. A network security scenario is applied to test effectiveness of our proposed simulator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Deraison, R.: Nessus Scanner, http://www.nessus.org/

  2. Internet Security Systems Internet Scanner, http://www.iss.net/

  3. Farmer, D., Spafford, E.: The cops security checker system. In: Proceedings of the Summer Usenix Conference (1990)

    Google Scholar 

  4. N-Stealth: Vulnerability-Assessment Product, http://www.nstalker.com/nstealth/

  5. Householder, A., Houle, K., Dougherty, C.: Computer attack trends challenge inernet security. In: Proceedings of the IEEE Symposium on Security and Privacy (2002)

    Google Scholar 

  6. McDermott, J.P.: Attack net penetration testing. In: Proceedings of the 2000 workshop on New security paradigms, pp. 15–21. ACM Press, New York (2000)

    Chapter  Google Scholar 

  7. Steffan, J., Schumacher, M.: Collaborative attack modeling. In: Proceedings of the 17th symposium on Proceedings of the 2002 ACM symposium on applied computing, pp. 253–259. ACM Press, New York (2002)

    Chapter  Google Scholar 

  8. Lee, C.W., Im, E.G., Chang, B.H., Kim, D.K.: Hierarchical state transition graph for internet attack scenarios. In: Proceedings of the International Conference on Information Networking 2003 (2003)

    Google Scholar 

  9. Mostow, J.R., Roberts, J.D., Bott, J.: Integration of an Internet Attack Simulator in an HLA Environment. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)

    Google Scholar 

  10. Welch, D., Conti, G., Marin, J.: A framework for an information warfare simulation. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)

    Google Scholar 

  11. Smith, R., Harya, B.: Firewall placement in a large network topology. In: Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computing Systems (1997)

    Google Scholar 

  12. Breslau, L., Estrin, D., Fall, K., Floyd, S., Heidemann, J., Helmy, A., Huang, P., McCanne, S., Varadhan, K., Xu, Y., Yu, H.: Advances in network simulation. IEEE Computer 33, 59–67 (2000), Expanded version available as USC TR 99-702b at, http://www.isi.edu/~johnh/PAPERS/Bajaj99a.html

    Google Scholar 

  13. Technology, O.: Opnet modeler (March 2001)

    Google Scholar 

  14. Schneier, B.: Attack tree secrets and lies, pp. 318–333. John Wiley and Sons, Chichester (2000)

    Google Scholar 

  15. SSF Research Network. Domain Modeling Language Reference Manual, http://www.ssfnet.org/SSFdocs/dmlReference.html

  16. Wagner, A., Dubendorfer, T., Plattner, B., Hiestand, R.: Experiences with worm propagation simulations, pp. 33–41. ACM, New York (2003)

    Google Scholar 

  17. Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the slammer worm. IEEE Security & Privacy 1, 33–39 (2003)

    Article  Google Scholar 

  18. SSF Research Network. Scalable Simulation Framework, http://www.ssfnet.org/homePage.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yun, J.B., Park, E.K., Im, E.G., In, H.P. (2005). A Scalable, Ordered Scenario-Based Network Security Simulator. In: Baik, DK. (eds) Systems Modeling and Simulation: Theory and Applications. AsiaSim 2004. Lecture Notes in Computer Science(), vol 3398. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30585-9_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30585-9_54

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24477-6

  • Online ISBN: 978-3-540-30585-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics