Browse > Article

A Study on Simulation-Based Worm Damage Assessment on ATCIS  

Kim, Ki-Hwan (National Defense University)
Kim, Wan-Ju (National Defense University)
Lee, Soo-Jin (National Defense University)
Publication Information
Journal of the Korea Institute of Military Science and Technology / v.11, no.1, 2008 , pp. 43-50 More about this Journal
Abstract
The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. But, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.
Keywords
Worm Simulation; ATCIS(Army Tactical Command Information System);
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Kevin Fall, Kannan Varadhan, "The ns Manual", 2007
2 D. Moore, C. Shannon, G. M. Voelker and S. Savage, "Internet Quarantine : Requirements for Containing Self-Propagating Code", INFOCOM, 2003
3 한국 전산원, "2006 국가 정보화 백서", p. 247, 2006
4 임재명, 윤종호, "슬래머 웜 전파과정 분석을 위 한 네트워크 모델링 및 시물레이터 구현", 한국통신학회논문지, 2007   과학기술학회마을
5 David Moore, et al., "The Spread of the Sapphire/Slammer Worm" available at http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
6 방사청, "육군전술지휘정보체계(ATCIS) 체계소개 및 운용가이드", 2006. 11. 30
7 S. Staniford, V. Paxson and N. Weaver, "How to 0wn the Internet in Your Spare Time," Proceedings of the 11th USENIX Security Symposium, 2002
8 S. Singh, C. Estan, G. Varghese, S. Savage, "The EarlyBird System for Real-time Detection of Unknown Worms", Technical Report CS2003-0761, UCSD, 2003
9 Darrell M. Kienzle, Matthew C. Elder, "Recent worms : a survey and trends", Proceedings of the 2003 ACM workshop on Rapid malcode, 2003
10 C. C. Zou, W. Gong and D. Towsley, "Code Red Worm Propagation Modeling and Analysis," In Proceedings of the 9th ACM conference on Computer and communications security, 2002
11 J. O. Kephart and S. R. White, "Measuring and Modeling Computer Virus Prevalence," Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1993