A scalable, ordered scenario-based network security simulator

Joo Beom Yun, Eung Ki Park, Eul Gyu Im, Hoh In

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, network security simulations aim at damage estimation of incidents in small-size networks or performance analysis of information protection systems. However, a simulator is needed to handle large-size networks since attacks in these days are based on large-size global networks such as the Internet. The existing simulators have limitations for simulating large-scale Internet attacks. In this paper, a scalable, ordered scenario-based network security simulator is proposed. Our proposed simulator is implemented by expanding the SSFNet program to client-server architectures. A network security scenario is applied to test effectiveness of our proposed simulator.

Original languageEnglish
Title of host publicationLecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)
EditorsD.-K. Baik
Pages487-494
Number of pages8
Volume3398
Publication statusPublished - 2005
EventThird Asian Simulation Conference, Asiasim 2004 - Jeju Island, Korea, Republic of
Duration: 2004 Oct 42004 Oct 6

Other

OtherThird Asian Simulation Conference, Asiasim 2004
CountryKorea, Republic of
CityJeju Island
Period04/10/404/10/6

Fingerprint

Network security
Simulators
Internet
Servers

ASJC Scopus subject areas

  • Hardware and Architecture

Cite this

Yun, J. B., Park, E. K., Im, E. G., & In, H. (2005). A scalable, ordered scenario-based network security simulator. In D-K. Baik (Ed.), Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) (Vol. 3398, pp. 487-494)

A scalable, ordered scenario-based network security simulator. / Yun, Joo Beom; Park, Eung Ki; Im, Eul Gyu; In, Hoh.

Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). ed. / D.-K. Baik. Vol. 3398 2005. p. 487-494.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yun, JB, Park, EK, Im, EG & In, H 2005, A scalable, ordered scenario-based network security simulator. in D-K Baik (ed.), Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). vol. 3398, pp. 487-494, Third Asian Simulation Conference, Asiasim 2004, Jeju Island, Korea, Republic of, 04/10/4.
Yun JB, Park EK, Im EG, In H. A scalable, ordered scenario-based network security simulator. In Baik D-K, editor, Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). Vol. 3398. 2005. p. 487-494
Yun, Joo Beom ; Park, Eung Ki ; Im, Eul Gyu ; In, Hoh. / A scalable, ordered scenario-based network security simulator. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). editor / D.-K. Baik. Vol. 3398 2005. pp. 487-494
@inproceedings{2fda635f741a4643bc9aa817e0974dc9,
title = "A scalable, ordered scenario-based network security simulator",
abstract = "A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, network security simulations aim at damage estimation of incidents in small-size networks or performance analysis of information protection systems. However, a simulator is needed to handle large-size networks since attacks in these days are based on large-size global networks such as the Internet. The existing simulators have limitations for simulating large-scale Internet attacks. In this paper, a scalable, ordered scenario-based network security simulator is proposed. Our proposed simulator is implemented by expanding the SSFNet program to client-server architectures. A network security scenario is applied to test effectiveness of our proposed simulator.",
author = "Yun, {Joo Beom} and Park, {Eung Ki} and Im, {Eul Gyu} and Hoh In",
year = "2005",
language = "English",
volume = "3398",
pages = "487--494",
editor = "D.-K. Baik",
booktitle = "Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)",

}

TY - GEN

T1 - A scalable, ordered scenario-based network security simulator

AU - Yun, Joo Beom

AU - Park, Eung Ki

AU - Im, Eul Gyu

AU - In, Hoh

PY - 2005

Y1 - 2005

N2 - A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, network security simulations aim at damage estimation of incidents in small-size networks or performance analysis of information protection systems. However, a simulator is needed to handle large-size networks since attacks in these days are based on large-size global networks such as the Internet. The existing simulators have limitations for simulating large-scale Internet attacks. In this paper, a scalable, ordered scenario-based network security simulator is proposed. Our proposed simulator is implemented by expanding the SSFNet program to client-server architectures. A network security scenario is applied to test effectiveness of our proposed simulator.

AB - A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, network security simulations aim at damage estimation of incidents in small-size networks or performance analysis of information protection systems. However, a simulator is needed to handle large-size networks since attacks in these days are based on large-size global networks such as the Internet. The existing simulators have limitations for simulating large-scale Internet attacks. In this paper, a scalable, ordered scenario-based network security simulator is proposed. Our proposed simulator is implemented by expanding the SSFNet program to client-server architectures. A network security scenario is applied to test effectiveness of our proposed simulator.

UR - http://www.scopus.com/inward/record.url?scp=26844511817&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=26844511817&partnerID=8YFLogxK

M3 - Conference contribution

VL - 3398

SP - 487

EP - 494

BT - Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)

A2 - Baik, D.-K.

ER -