skip to main content
10.1145/1456223.1456239acmotherconferencesArticle/Chapter ViewAbstractPublication PagescststConference Proceedingsconference-collections
research-article

Network security simulation and evaluation

Published: 28 October 2008 Publication History

Abstract

In this paper, we propose an approach of analyzing and evaluating network security based on simulation. It can provide measurable data to help improving network security by simulating various cyber attacks and calculating the security loss of the network to estimate the impacts of the attacks. Firstly, the basic method of evaluation and formulae of calculating security loss are proposed, and then the simulation models and the simulation system which has been implemented are introduced.

References

[1]
Farmer D, Spafford E H. The Cops Security Checker System, Technical Report CSD-TR-993, Department of Computer Sciences, Purdue University. 1991.
[2]
TRIPWIRE, http://www.tripwire.com/
[3]
NMAP, http://www.insecure.org/nmap/index.html, 2003.
[4]
Renaud Deraison, Nessus Scanner, http://www.nessus.org/, 2004.
[5]
ISS, http://www.iss.com/, 2004.
[6]
Thomas M. Chen, An Overview of Electronic Attacks, Idea Group Publishing, 2006.
[7]
Anirban Chakrabarti and G. Manimaran, Internet Infrastructure Security: A Taxonomy, Network, IEEE Volume 16, Issue 6, Nov/Dec 2002.
[8]
Steven T Eckmann, Giovanni Vigna, Richard A. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection, Journal of Computer Security Volume 10, 2002.
[9]
Salim Hariri, Guangzhi Qu, 2003, Impact Analysis of Faults and Attacks in Large-Scale Networks, Security & Privacy, IEEE Volume 1, Issue 5, Sept-Oct. 2003.

Cited By

View all
  • (2012)Intelligent network security assessment with modeling and analysis of attack patternsSecurity and Communication Networks10.1002/sec.5915:12(1471-1486)Online publication date: 27-Jun-2012
  • (2011)A Network Security Situation Analysis framework based on information fusion2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference10.1109/ITAIC.2011.6030216(326-332)Online publication date: Aug-2011

Recommendations

Reviews

Goran Trajkovski

Typically, we resort to vulnerability scanning when researching the security status of a network. In this brief paper, the authors attempt to persuade readers that network security can be efficiently assessed via simulation. Relevant performance parameters from all layers of the network model are taken into consideration in this model. The authors devise probabilistic formulae for calculating the attack impact on a singular device and on the system. The authors present a study that tabulates the results of problems uncovered under attack scenarios. The authors suggest that this approach should be followed to discover improper configurations or problems with firewalls, and, if any interventions happened in the network, to evaluate the fixes and patching of the system. While further research is needed, this study advocates for alternatives to vulnerability scanning, with efforts to generate statistical quantification of network security parameters. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSTST '08: Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
October 2008
733 pages
ISBN:9781605580463
DOI:10.1145/1456223
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • The French Chapter of ACM Special Interest Group on Applied Computing
  • Ministère des Affaires Etrangères et Européennes
  • Région Ile de France
  • Communauté d'Agglomération de Cergy-Pontoise
  • Institute of Electrical and Electronics Engineers Systems, Man and Cybernetics Society
  • The European Society For Fuzzy And technology
  • Institute of Electrical and Electronics Engineers France Section
  • Laboratoire des Equipes Traitement des Images et du Signal
  • AFIHM: Ass. Francophone d'Interaction Homme-Machine
  • The International Fuzzy System Association
  • Laboratoire Innovation Développement
  • University of Cergy-Pontoise
  • The World Federation of Soft Computing
  • Agence de Développement Economique de Cergy-Pontoise
  • The European Neural Network Society
  • Comité d'Expansion Economique du Val d'Oise

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 October 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attack impacts
  2. cyber attack modeling
  3. cyber attack simulation
  4. network modeling
  5. network security evaluation

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2012)Intelligent network security assessment with modeling and analysis of attack patternsSecurity and Communication Networks10.1002/sec.5915:12(1471-1486)Online publication date: 27-Jun-2012
  • (2011)A Network Security Situation Analysis framework based on information fusion2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference10.1109/ITAIC.2011.6030216(326-332)Online publication date: Aug-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media