skip to main content
10.5555/1351542.1351749acmconferencesArticle/Chapter ViewAbstractPublication PageswscConference Proceedingsconference-collections
research-article

Cyber attack modeling and simulation for network security analysis

Published: 09 December 2007 Publication History

Abstract

Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming. As an alternative, in this paper, we present a simulation modeling approach to represent computer networks and intrusion detection systems (IDS) to efficiently simulate cyber attack scenarios. The outcome of the simulation model is a set of IDS alerts that can be used to test and evaluate cyber security systems. In particular, the simulation methodology is designed to test information fusion systems for cyber security that are under development.

References

[1]
Lee, J.-S., J.-R. Jung, J.-S. Park, and S. D. Chi. 2004. Linux-based system modeling for cyber attack simulation. In Proceedings of the 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, Jeju Island.
[2]
Linus, J. 2001. An Introduction to Data and Information Fusion. (Presentation) Available Online via <http://www.infofusion.buffalo.edu/tutorialPage.php> {Accessed July 15, 2007}
[3]
Kelton, W. D., R. P. Sadowski, and D. T. Sturrock. 2004. Simulation with ARENA, Third Edition, McGraw-Hill, Boston, MA.
[4]
Nicol, D., J. Liu, M. Liljenstam, and G. Yan. 2003. Simulation of large-scale networks using SSF. In Proceedings of the 2003 Winter Simulation Conference, ed. S. Chick, P. J. Sánchez, D. Ferrin, and D. J. Morrice, 650-657. Institute of Electrical and Electronics Engineers, Piscataway, NJ.
[5]
Sudit, M., A. Stotz, and M. Holender. 2005. Situational awareness of coordinated cyber attack. In Proceedings of the International Society for Optical Engineering Conference, Orlando, FL.

Cited By

View all
  • (2020)Session-level adversary intent-driven cyberattack simulatorProceedings of the IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications10.5555/3451906.3451908(7-15)Online publication date: 14-Sep-2020
  • (2017)Analysis of automated adversary emulation techniquesProceedings of the Summer Simulation Multi-Conference10.5555/3140065.3140081(1-12)Online publication date: 9-Jul-2017
  • (2016)A characterization of cybersecurity simulation scenariosProceedings of the 19th Communications & Networking Symposium10.5555/2962686.2962689(1-8)Online publication date: 3-Apr-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WSC '07: Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come
December 2007
2659 pages
ISBN:1424413060

Sponsors

  • IIE: Institute of Industrial Engineers
  • INFORMS-SIM: Institute for Operations Research and the Management Sciences: Simulation Society
  • ASA: American Statistical Association
  • IEEE/SMC: Institute of Electrical and Electronics Engineers: Systems, Man, and Cybernetics Society
  • SIGSIM: ACM Special Interest Group on Simulation and Modeling
  • NIST: National Institute of Standards and Technology
  • (SCS): The Society for Modeling and Simulation International

Publisher

IEEE Press

Publication History

Published: 09 December 2007

Check for updates

Qualifiers

  • Research-article

Conference

WSC07
Sponsor:
  • IIE
  • INFORMS-SIM
  • ASA
  • IEEE/SMC
  • SIGSIM
  • NIST
  • (SCS)
WSC07: Winter Simulation Conference
December 9 - 12, 2007
Washington D.C.

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Session-level adversary intent-driven cyberattack simulatorProceedings of the IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications10.5555/3451906.3451908(7-15)Online publication date: 14-Sep-2020
  • (2017)Analysis of automated adversary emulation techniquesProceedings of the Summer Simulation Multi-Conference10.5555/3140065.3140081(1-12)Online publication date: 9-Jul-2017
  • (2016)A characterization of cybersecurity simulation scenariosProceedings of the 19th Communications & Networking Symposium10.5555/2962686.2962689(1-8)Online publication date: 3-Apr-2016
  • (2016)Scalable Attack Graph GenerationProceedings of the 11th Annual Cyber and Information Security Research Conference10.1145/2897795.2897821(1-4)Online publication date: 5-Apr-2016
  • (2011)An overview of cyber attack and computer network operations simulationProceedings of the 2011 Military Modeling & Simulation Symposium10.5555/2048558.2048572(92-100)Online publication date: 3-Apr-2011
  • (2010)Simulating windows-based cyber attacks using live virtual machine introspectionProceedings of the 2010 Summer Computer Simulation Conference10.5555/1999416.1999487(550-555)Online publication date: 11-Jul-2010
  • (2010)Cyber security quantification modelProceedings of the 3rd international conference on Security of information and networks10.1145/1854099.1854130(142-148)Online publication date: 7-Sep-2010
  • (2009)Analyzing production modifications of a C-130 engine repair facility using simulationWinter Simulation Conference10.5555/1995456.1995700(1770-1777)Online publication date: 13-Dec-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media