Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.1.89

IARAM: Internet Attack Representation And Mapping Mechanism for a Simulator  

Lee, Cheol-Won (ETRI)
Kim, Jung-Sik (Hanyang Univ.)
Kim, Dong-Kyu (Ajou Univ.)
Abstract
Internet becomes more and more popular, and most companies and institutes use web services for e-business and many other purposes. With the explosion of Internet, the attack of internet worm has grown. Simulation is one of the most widely used method to study internet worms. But, it is quite challenging to simulate very large-scale worm attacks because of various reasons. By this reason, we often use the modeling network simulation technique. But, it also has problem that it difficult to apply each worm attacks to simulation. In this paper, we propose worm attack representation and mapping methods for apply worm attack to simulation. The proposed method assist to achieve the simulation efficiency. And we can express each worm attacks more detail. Consequently, the simulation of worm attacks has the time-efficiency and the minuteness.
Keywords
IARAM;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Kalyan S. Perumalla, Srikanth Sundaragopalan. "High-Fidelity Modeling of Computer Network Worms". The 20th Annual Computer Security Applications Conference(ACSAC'04), pp. 126- 135, 2004
2 Xiang Zeng, Rajive Bagrodia, Mario Gerla. "GloMoSim: A library for parallel simulation of large-scale wireless networks". The 12th Workshop on Parallel and Distributed Simulation, pp. 154-161, 1998
3 Benjamin Melamed, Shuo Pan, Yorai Wardi. "Hybrid discrete-continuous fluid-flow simulation". SPIE, Volume 4526, pp. 263-270, 2001
4 Cameron Kiddle, Rob Simmonds, Carey Williamson, Brian Unger. "Hybrid packet/fluid flow network simulation". The Seventeenth Workshop on Parallel and Distributed Simulation (PADS'03), pp. 143, 2003
5 T. Tidwell, R. Larson, K.Fitch, J.Hale, "Modeling Internet Attacks", The 2001 IEEE Workshop on Information Assurance and Security, pp. 54-59, 2001
6 Technical Report, "ANALYSIS: .ida "Code Red" Worm", eEye Digital Security, http://research.eeye.com:80/html/advisories/published/AL20010717.html, 2001
7 Technical Report, "ANALYSIS: CodeRed II Worm", http://research.eeye.com/html/advisories/ published/AL20010804.html, eEys Digital Security, 2001
8 Songjie Wei, Jelena Mirkovic, Martin Swany, "Distributed Worm Simulation with a Realistic Internet Model", The Workshop on Principles of Advanced and Distributed Simulation (PADS'05), pp. 71-79, 2005
9 Vishal Misra, Wei-Bo Gong, Don Towsley, "Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED", ACM SIGCOMM Computer Communication Review, Volume 30, Issue 4, pp. 151-160, 2000   DOI
10 NS-2 Web page. http://www.isi.edu/nsnam/ns/
11 Stuart Staniford, Vern Paxson, Nicholas Weaver. "How to Own the Internet in Your Spare Time". The 11th USENIX Security Symposium, pp. 149-167, 2002
12 Lee C.W., Im E.G., Chang B.H., Kim D.K., "Hierarchical state transition graph for internet attack scenarios", The International Conference on Information Networking 2003, 2003
13 D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, "The Spread of the Sapphire/Slammer Worm", CAIDA Technical report, http://www.caida.org/publications/pap ers /2003/sapphire/, 2003
14 Yong Liu, Francesco Lo Presti, Vishal Misra. "Fluid Models and Solutions for Large-Scale IP Networks". ACM SIGMETRICS Performance Evaluation Review, Volume 31, Issue 1, pp. 91-101, 2003   DOI
15 Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray. "Simulating Realistic Network Worm Traffic for Worm Warning System Design and Testing". The ACM WORM 2003, pp.24-33
16 SSFNet Web page. http://www.ssfnet.org/
17 K. Ilgun, R. A. Kemmerer, P. A. Porras, "State Transition Analysis: A Rule-Based Intrusion Detection System", The IEEE Transactions on Software Engineering, VOL. 21, No. 3, pp. 181-199, 1995   DOI   ScienceOn
18 Stuart Staniford, Vern Paxson, Nicholas Weaver. "How to Own the Internet in Your Spare Time". The 11th USENIX Security Symposium, pp. 149-167, 2002
19 김정식, 박진호, 조재익, 최경호, 임을규, "RCS 웜 시뮬레이션을 위한 Hybrid 모델링 방법", 한국정보보호학회논문지(1598-3986), 제17권 3호, pp. 43-53, 2007년 6월   과학기술학회마을
20 Richard Zurawski, MengChu Zhou, "Petri Nets and Industrial Applications: A Tutorial", The IEEE Transactions on Industrial Electronics, VOL. 41, No. 6, 1994
21 David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, Nicholas Weaver. "The Spread of the Sapphire/Slammer Worm". CAIDA Technical report, 2003
22 D.J.Daley, J.Gani. "Epidemic modelling : an introduction", Cambridge University Press, 1999
23 Giovanni Vigna, Steve T. Eckmann, Richard A. Kemmerer, "The STAT Tool Suite", The IEEE DARPA Information Survivability Conference and Exposition 2000, Vol. 2, pp. 46-55, 2000
24 David Moore, Colleen Shannon. "The Spread of the Code-Red Worm (CRvw)". CAIDA Analysis page. www.caida.org/analysis/security /code-red/coderedv2_analysis.xml
25 F. Bordeleau, J. P. Corriveau, B. Selic, "A scenario-based approach to hierarchical state machine design", The Third IEEE Symposium on Object-Oriented Real-Time Distributed Computing, pp. 78-85, 2000