A distributed simulation framework for modeling cyber attacks and the evaluation of security measures

被引:9
作者
Ashtiani, Mehrdad [1 ]
Azgomi, Mohammad Abdollahi [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Trustworthy Comp Lab, Tehran 1684613114, Iran
来源
SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL | 2014年 / 90卷 / 09期
关键词
Distributed simulation; high-level architecture; cyber security; cyber attacks; distributed cyber attack simulator;
D O I
10.1177/0037549714540221
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The aim of this work is to propose a framework for the distributed simulation of cyber attacks based on high-level architecture (HLA), which is a commonly used standard for distributed simulations. The proposed framework and the corresponding simulator, which is called the distributed cyber attack simulator (abbreviated by DCAS), help administrators to model and evaluate the security measures of the networks. At the core of the DCAS is a simulation engine based on Portico, which is an open source HLA run-time infrastructure. The DCAS works in two modes: interactive and automated. Three types of simulation components (which are called federates in HLA terminology) are considered in the framework: the (1) network federate, (2) attacker federate and (3) defender federate. The simulator provides features for graphical design of the network models, animated traffic simulation, data collection, statistical analysis and different consoles for attacking and defending elements (e. g., intrusion detection systems, intrusion prevention systems). To increase the fidelity of the simulation outputs, real-world payloads are used by the DCAS. All the exploits information and the parameters of various network elements are automatically extracted from the open source vulnerability database. Also, the Snort rule-set is used as the signature database of the defending elements. The architecture and algorithms of the DCAS and the corresponding underlying simulation engine plus the security evaluation results of two illustrative examples are presented in this paper.
引用
收藏
页码:1071 / 1102
页数:32
相关论文
共 39 条
[1]   A stochastic model of attack process for the evaluation of security metrics [J].
Almasizadeh, Jaafar ;
Azgomi, Mohammad Abdollahi .
COMPUTER NETWORKS, 2013, 57 (10) :2159-2180
[2]  
Benson A., 2010, P 10 ACM SIGCOMM C I, P267, DOI [10.1145/1879141.1879175.5, DOI 10.1145/1879141.1879175, 10.1145/1879141.1879175]
[3]  
Bosworth S., 2002, Computer security handbook
[4]   Simulation of cyber attacks with applications in homeland defense training [J].
Brown, B ;
Cutts, A ;
McGrath, D ;
Nicol, DM ;
Smith, TP ;
Tofel, B .
SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND DEFENSE AND LAW ENFORCEMENT II, 2003, 5071 :63-71
[5]   Agent directed HLA simulation for complex supply chain modeling [J].
Bruzzone, AG ;
Mosca, R ;
Revetria, R ;
Bocca, E ;
Briano, E .
SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2005, 81 (09) :647-655
[6]  
Calvin J O., 1996, 14th Workshop on Standards for the Interoperability of Distributed Simulations, V2, P705
[7]  
Canavan JE., 2001, FUNDAMENTALS NETWORK
[8]  
Chabukswar R, 2010, P 1 SEC CONTR SYST W
[9]  
Channakeshava Karthik., 2009, Proceedings of the 2nd International Conference on Simulation Tools and Techniques, P6
[10]   Network Attack-Defense Simulation Training System Based on HLA [J].
Chen, Gang ;
Xiang, Shang ;
Ji, GuanQun ;
Jia, YiLong .
2009 INTERNATIONAL CONFERENCE ON COMPUTER MODELING AND SIMULATION, PROCEEDINGS, 2009, :303-+