Attacker and Host Modeling for Cyber-Attack Simulation

사이버 공격 시뮬레이션을 위한 공격자 및 호스트 모델링

  • 정정례 (㈜어필텔레콤) ;
  • 이장세 (한국항공대학교 컴퓨터공학과) ;
  • 박종서 (한국항공대학교 컴퓨터공학과) ;
  • 지승도 (한국항공대학교 컴퓨터공학과)
  • Published : 2003.06.01

Abstract

The major objective of this paper is to propose the method of attacker and host modeling for cyber-attack simulation. In the security modeling and simulation for information assurance, it is essential the modeling of attacker that is able to generate various cyber-attack scenarios as well as the modeling of host, which is able to represent behavior on attack concretely The security modeling and simulation, which was announced by Cohen, Nong Ye and etc., is too simple to concretely analyze attack behavior on the host. And, the attacker modeling, which was announced by CERT, Laura and etc., is impossible to represent complex attack excepting fixed forms. To deal with this problem, we have accomplished attacker modeling by adopted the rule-based SES which integrates the existing SES with rule-based expert system for synthesis and performed host modeling by using the DEVS formalism. Our approach is to show the difference from others in that (ⅰ) it is able to represent complex and repetitive attack, (ⅱ) it automatically generates the cyber-attack scenario suitable on the target system, (ⅲ) it is able to analyze host's behavior of cyber attack concretely. Simulation tests performed on the sample network verify the soundness of proposed method.

Keywords

References

  1. IEEE Computer Are We Forgetting the Risks of Information Technology T.A Longstaff;C.Chittister;R.Pethia;Y.Y.Haimes
  2. 1999 IEEE Symposium on Security and Privacy Special 20th Anniversary Program,The Claremont Resort Berkeley, California Simulating Cyber Attacks Defenses, and Consequences Fred Cohen
  3. AT&T Laboratory Intrusion Detection Amoroso,E.
  4. Communications of the ACM CACS-A process Control Approach to Cyber Attack Detection Nong ye;Joseph Giordano
  5. CMU Attack Modeling for Information Security and Survivability
  6. 나노미디어 디지털 보안의 비밀과거짓 브루스 슈나이어;채윤기(옮김)
  7. DARPA Information Survivability Conference & Exposition Ⅱ v.2 Computer-Attack Graph Generation Tool Laura P. Swiler;Cynthis Philips;David Ellis;Stefan Chakerian
  8. Object-oriented Simulation with Hierarchical, Modular Models:Intelligent Agents and Endomorphic systems Zeigler,B.P
  9. Multifacetted Modeling and Discrete Event Simulation Zeigler,B.P.
  10. Dept, of Electrical and Computer Engineering Modeling and Simulation for High Autonomy Systems, Ph.d. Dissertation S.D. Chi
  11. Proc. IASTED International Conference NETE:Campuse Network Design Tool Chi,S.D.;Lee,J.S.;Lee,J.K;Whang,J.H.
  12. 과학재단 정보시스템의 구성 및 성능 분석 자동화 방법론에 관한 연구