Abstract
The cyber attack simulation tool, SECUSIM, is presented for specifying attack mechanisms, verifying defense mechanisms, and evaluating their consequences. The tool has been successfully developed by employing the advanced modeling and simulation concepts such as SES/MB (System Entity Structure / Model Base) framework, DEVS (Discrete Event System Specification) formalism, and experimental frame. SECUSIM is currently implemented on the basis of Visual C++ and enables a simulation of twenty attack scenarios against hundreds network components.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
T. A. Longstaff, Clyde Chittister, Rich Pethia, Yacov Y. Haimes, “Are We Forgetting the Risks of Information Technology”, IEEE Computer, pp 43–51, December, 2000.
N. Ye, C. Hosmer, J. Giordano, J. Feldman, “Critical Information Infrastructure Protection through Process Modeling and Model-based Information Fusion”, Proceedings of the Information Survivability Workshop, 1998.
F. Cohen “Simulating Cyber Attacks, Defenses, and Consequences”, IEEE Symposium on Security and Privacy Special 20th Anniversary Program, Berkeley, CA, May, 1999.
E. Amoroso, Intrusion Detection, AT&T Laboratory, Intrusion Net Books, January, 1999.
T. A. Wadlow, The Process of Network Security, Addison-Wesley, 2000.
B. P. Zeigler, Object-oriented Simulation with Hierarchical, Modular Models: Intelligent Agents and Endomorphic systems, Academic Press, 1990.
B.P. Zeigler, Multifacetted Modeling and Discrete Event Simulation, Academic Press, 1984.
S. D. Chi, J. S. Park, K. C. Jung, J. S. Lee, “Network Security Modeling and Cyber-attack Simulation Methodology”, Lecture Notes on Computer Science series, 6th Australian Conf. On Information Security and Privacy, Sydney, July, 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, J.S., Lee, JS., Kim, H.K., Jeong, JR., Yeom, DB., Chi, SD. (2001). SECUSIM: A Tool for the Cyber-Attack Simulation. In: Qing, S., Okamoto, T., Zhou, J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45600-7_53
Download citation
DOI: https://doi.org/10.1007/3-540-45600-7_53
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42880-0
Online ISBN: 978-3-540-45600-1
eBook Packages: Springer Book Archive