Simulating cyber-intrusion using ordered UML model-based scenarios

Eung Ki Park, Joo Beom Yun, Hoh Peter In

Research output: Contribution to journalConference articlepeer-review

1 Citation (Scopus)

Abstract

Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simulation aims at estimation of a small-size network or performance analysis of information protection systems. However, a systematic way to develop network security simulation is needed. In this paper, an ordered UML-based scenario model and its network security simulator are proposed. A network security scenario is presented as a case study of our proposed simulation model.

Original languageEnglish
Pages (from-to)643-651
Number of pages9
JournalLecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)
Volume3398
DOIs
Publication statusPublished - 2005
EventThird Asian Simulation Conference, Asiasim 2004 - Jeju Island, Korea, Republic of
Duration: 2004 Oct 42004 Oct 6

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Simulating cyber-intrusion using ordered UML model-based scenarios'. Together they form a unique fingerprint.

Cite this