Simulating cyber attacks, defences, and consequences

被引:59
作者
Cohen, F [1 ]
机构
[1] Sandia Natl Labs, Livermore, CA 94550 USA
关键词
D O I
10.1016/S0167-4048(99)80115-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information on the application of modeling and simulation technologies to information protection is presented. Simulations of attacks, defences and consequences in complex cyber systems such as computer networks, and more specifically about one attempt to create simulations capable of providing meaningful results in this field, are discussed.
引用
收藏
页码:479 / 518
页数:40
相关论文
共 8 条
[1]  
Amoroso E.G., 1994, FUNDAMENTALS COMPUTE
[2]  
COHEN F, 1997, NETWORK SECURITY JUN
[3]  
COHEN F, COMPUTERS SECURITY
[4]  
COHEN F, 1999, NETWORK SECURITY MAR
[5]  
COHEN F, 1997, NETWORK SECURITY MAR
[6]  
HOWARD JD, 1997, THESIS CARNEGIEMELLO
[7]   A TAXONOMY OF COMPUTER-PROGRAM SECURITY FLAWS [J].
LANDWEHR, CE ;
BULL, AR ;
MCDERMOTT, JP ;
CHOI, WS .
ACM COMPUTING SURVEYS, 1994, 26 (03) :211-254
[8]  
ROCHLIS J, 1989, CACM, V32