Abstract
The paper considers development of the approach to simulation of protection mechanisms against infrastructure attacks based on biological metaphor. The specification of models of attacks and protection mechanisms is given. The environment for security mechanisms simulation based on biological metaphor is studied, experiments that demonstrate possibilities of the designed simulation system are carried out.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chen, Y., Chen, H.: NeuroNet: An Adaptive Infrastructure for Network Security. International Journal of Information, Intelligence and Knowledge 1(2) (2009)
Chen, S., Tang, Y.: Slowing Down Internet Worms. In: Proc. of the 24th International Conference on Distributed Computing Systems (2004)
Dasgupta, D.: Immuno-inspired autonomic system for cyber defense. Information Security Tech. Report archive 12(4) (2007)
Demers, A., Greene, D., Hauser, C., et al.: Epidemic algorithms for replicated database maintenance. In: Proc. of the Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 1987 (1987)
Dressler, F.: Bio-inspired mechanisms for efficient and adaptive network security. Service Management and Self-Organization in IP-based Networks (2005)
Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 8(4) (2000)
Gamer, T., Mayer, C.: Large-Scale Evaluation of Distributed Attack Detection. In: Proc. of the 2nd Int. Workshop on OMNeT++, Rome (2009)
Kotenko, I., Konovalov, A., Shorov, A.: Agent-based Modeling and Simulation of Botnets and Botnet Defense. In: Conference on Cyber Conflict. CCD COE Publications (2010)
Kotenko, I., Shorov, A., Novikova, E.: Simulation of Protection Mechanisms Based on “Nervous Network System” against Infrastructure Attacks. In: Proc. of the 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2013). IEEE Society (2013)
Li, J., Mirkovic, J., Wang, M., Reither, P., Zhang, L.: Save: Source address validity enforcement protocol. In: Proc. of IEEE INFOCOM (2002)
Meisel, M., Pappas, V., Zhang, L.: A Taxonomy of Biologically Inspired Research in Computer Networking. Computer Networks (2009)
Owezarski, P., Larrieu, N.: A Trace Based Method for Realistic Simulation. In: Comm. of the IEEE Int. Conf., Toulouse (2004)
Riley, G., Sharif, M., Lee, W.: Simulating Internet Worms. In: Proc. of the 12th Int. Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Atlanta (2004)
Schoonderwoerd, R., Bruten, J., Holland, O., Rothkrantz, L.: Ant-based load balancing in telecommunications networks. Adapt. Behav. 5(2) (1996)
Simmonds, R., Bradford, R., Unger, B.: Applying Parallel Discrete Event Simulation to Network Emulation. In: Proc. of the Fourteenth Workshop on Parallel and Distributed Simulation (PADS 2000), Washington (2000)
Schuchard, M., Mohaisen, A., Kune, D., et al.: Loosing Control of the Internet: Using the Data Plane to Attack the Control Plane. In: Proc. of the 17th ACM Conf. on Computer and Communication Security (CCS 2010). ACM (2010)
Wagner, A., Dubendorfer, T., Plattner, B., et al.: Experiences with Worm Propagation Simulations. In: Proc. of the ACM Workshop on Rapid Malcode, New York (2003)
Williamson, M.: Throttling Viruses: Restricting propagation to defeat malicious mobile code. In: Proceedings of ACSAC Security Conference (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kotenko, I., Shorov, A. (2015). Simulation of Bio-inspired Security Mechanisms against Network Infrastructure Attacks. In: Camacho, D., Braubach, L., Venticinque, S., Badica, C. (eds) Intelligent Distributed Computing VIII. Studies in Computational Intelligence, vol 570. Springer, Cham. https://doi.org/10.1007/978-3-319-10422-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-10422-5_14
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10421-8
Online ISBN: 978-3-319-10422-5
eBook Packages: EngineeringEngineering (R0)