Skip to main content

Simulation of Bio-inspired Security Mechanisms against Network Infrastructure Attacks

  • Conference paper
Intelligent Distributed Computing VIII

Part of the book series: Studies in Computational Intelligence ((SCI,volume 570))

Abstract

The paper considers development of the approach to simulation of protection mechanisms against infrastructure attacks based on biological metaphor. The specification of models of attacks and protection mechanisms is given. The environment for security mechanisms simulation based on biological metaphor is studied, experiments that demonstrate possibilities of the designed simulation system are carried out.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, Y., Chen, H.: NeuroNet: An Adaptive Infrastructure for Network Security. International Journal of Information, Intelligence and Knowledge 1(2) (2009)

    Google Scholar 

  2. Chen, S., Tang, Y.: Slowing Down Internet Worms. In: Proc. of the 24th International Conference on Distributed Computing Systems (2004)

    Google Scholar 

  3. Dasgupta, D.: Immuno-inspired autonomic system for cyber defense. Information Security Tech. Report archive 12(4) (2007)

    Google Scholar 

  4. Demers, A., Greene, D., Hauser, C., et al.: Epidemic algorithms for replicated database maintenance. In: Proc. of the Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 1987 (1987)

    Google Scholar 

  5. Dressler, F.: Bio-inspired mechanisms for efficient and adaptive network security. Service Management and Self-Organization in IP-based Networks (2005)

    Google Scholar 

  6. Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 8(4) (2000)

    Google Scholar 

  7. Gamer, T., Mayer, C.: Large-Scale Evaluation of Distributed Attack Detection. In: Proc. of the 2nd Int. Workshop on OMNeT++, Rome (2009)

    Google Scholar 

  8. Kotenko, I., Konovalov, A., Shorov, A.: Agent-based Modeling and Simulation of Botnets and Botnet Defense. In: Conference on Cyber Conflict. CCD COE Publications (2010)

    Google Scholar 

  9. Kotenko, I., Shorov, A., Novikova, E.: Simulation of Protection Mechanisms Based on “Nervous Network System” against Infrastructure Attacks. In: Proc. of the 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2013). IEEE Society (2013)

    Google Scholar 

  10. Li, J., Mirkovic, J., Wang, M., Reither, P., Zhang, L.: Save: Source address validity enforcement protocol. In: Proc. of IEEE INFOCOM (2002)

    Google Scholar 

  11. Meisel, M., Pappas, V., Zhang, L.: A Taxonomy of Biologically Inspired Research in Computer Networking. Computer Networks (2009)

    Google Scholar 

  12. Owezarski, P., Larrieu, N.: A Trace Based Method for Realistic Simulation. In: Comm. of the IEEE Int. Conf., Toulouse (2004)

    Google Scholar 

  13. Riley, G., Sharif, M., Lee, W.: Simulating Internet Worms. In: Proc. of the 12th Int. Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Atlanta (2004)

    Google Scholar 

  14. Schoonderwoerd, R., Bruten, J., Holland, O., Rothkrantz, L.: Ant-based load balancing in telecommunications networks. Adapt. Behav. 5(2) (1996)

    Google Scholar 

  15. Simmonds, R., Bradford, R., Unger, B.: Applying Parallel Discrete Event Simulation to Network Emulation. In: Proc. of the Fourteenth Workshop on Parallel and Distributed Simulation (PADS 2000), Washington (2000)

    Google Scholar 

  16. Schuchard, M., Mohaisen, A., Kune, D., et al.: Loosing Control of the Internet: Using the Data Plane to Attack the Control Plane. In: Proc. of the 17th ACM Conf. on Computer and Communication Security (CCS 2010). ACM (2010)

    Google Scholar 

  17. Wagner, A., Dubendorfer, T., Plattner, B., et al.: Experiences with Worm Propagation Simulations. In: Proc. of the ACM Workshop on Rapid Malcode, New York (2003)

    Google Scholar 

  18. Williamson, M.: Throttling Viruses: Restricting propagation to defeat malicious mobile code. In: Proceedings of ACSAC Security Conference (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kotenko, I., Shorov, A. (2015). Simulation of Bio-inspired Security Mechanisms against Network Infrastructure Attacks. In: Camacho, D., Braubach, L., Venticinque, S., Badica, C. (eds) Intelligent Distributed Computing VIII. Studies in Computational Intelligence, vol 570. Springer, Cham. https://doi.org/10.1007/978-3-319-10422-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10422-5_14

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10421-8

  • Online ISBN: 978-3-319-10422-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics