• 제목/요약/키워드: Internet Security Simulation

검색결과 218건 처리시간 0.03초

A Simulation Analysis of Abnormal Traffic-Flooding Attack under the NGSS environment

  • Kim, Hwan-Kuk;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1568-1570
    • /
    • 2005
  • The internet is already a part of life. It is very convenient and people can do almost everything with internet that should be done in real life. Along with the increase of the number of internet user, various network attacks through the internet have been increased as well. Also, Large-scale network attacks are a cause great concern for the computer security communication. These network attack becomes biggest threat could be down utility of network availability. Most of the techniques to detect and analyze abnormal traffic are statistic technique using mathematical modeling. It is difficult accurately to analyze abnormal traffic attack using mathematical modeling, but network simulation technique is possible to analyze and simulate under various network simulation environment with attack scenarios. This paper performs modeling and simulation under virtual network environment including $NGSS^{1}$ system to analyze abnormal traffic-flooding attack.

  • PDF

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권5호
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.

실시간 인터넷 보안 서비스 제공을 위한 정책기반 통합 서버 설계 및 시뮬레이션 (Design and Simulation of Policy Based Integrated Server System Capable to Provide Real-time Internet Security Service)

  • 김기영;안개일;장종수;이상호
    • 정보처리학회논문지C
    • /
    • 제8C권5호
    • /
    • pp.565-572
    • /
    • 2001
  • 개방형 구조를 갖는 인터넷이 전 세계적으로 광범위하게 활용되면서 네트워크상의 보안 취약점에 대한 사이버테러 위험성이 급증하고 있는 추세이다. 지금까지 네트워크 상의 정보보호는 주로 보안 호스트 및 특정 보안 시스템에 대한 수동적인 정보보호였다. 그러나 이러한 소극적인 정보보호만으로는 전세계적으로 연결된 인터넷 시스템들의 침해에 대한 방어 능력이 취약하여, 사이버테러의 방어에 한계가 있다고 판단된다. 즉 보안 호스트에 국한되는 소극적인 보안이 아니라, 전체 네트워크 차원의 통합 보안관리기능이 제공되어야 한다. 본 논문에서는 보안 문제점들의 기술 제약요인 및 제반 환경요인의 해결방안에 접근하기 위하여 네트워크 차원의 능동적 정보보호 기능을 위한 정책(Policy) 기반의 정보보호 서비스 구조, 제공 기능에 대하여 살펴본다. 그리고 정보보호 서비스 제공을 위한 목표시스템의 설계와 향후 네트워크 차원의 전개 방안에 대하여도 네트워크 보안 시뮬레이션을 통하여 검토한다.

  • PDF

계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션 (Application of Contract Net Protocol to the Design and Simulation of Network Security Model)

  • 서경진;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제12권4호
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

인터넷 보안 시뮬레이션을 위한 공격 모델링 (Attack Modeling for an Internet Security Simulation)

  • 서정국;최경희;정기현;박승규;심재홍
    • 정보처리학회논문지C
    • /
    • 제11C권2호
    • /
    • pp.183-192
    • /
    • 2004
  • 최근 인터넷 사용이 폭발적으로 증가함에 따라 인터넷은 다양한 공격에 노출되었다. 이러한 인터넷 공격을 시뮬레이션 하기 위해서는 공격을 효과적으로 모델링 할 수 있어야 한다. 그러나 기존의 인터넷 공격 모델링 기법들은 공격을 단순히 특징에 파라 분류하거나 종류를 나누는 네 중점을 두고 있으며, 인터넷 보안 시뮬레이션을 위한 공격 시나리오를 표현하는데 있어서는 적합하지 않았다. 본 논문에서는 기존의 트리기반 공격 모델링 기법을 보완하여 인터넷 보안 시뮬레이션의 공격 모델링 기법으로 활용할 수 있게 개선하였다. 개선된 공격 모델링 기법은 복잡한 시나리오의 표현 불가, 공격 실행 순서의 모호함, 시스템 상태 정보의 결여 풍과 같은 기존 트리 기반 모델링 기법의 문제점들을 해결하였다. 또한 기존 모델링 기법으로는 기술할 수 없었던 동시간 공격 표현, 정밀한 공격 시작 및 수행기간 지정 등이 가능하도록 하였다.

Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications

  • Kim, Sungwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권10호
    • /
    • pp.4177-4190
    • /
    • 2015
  • Current research on Internet of Things (IoT) has primarily addressed the means to enhancing smart resource allocation, automatic network operation, and secure service provisioning. In particular, providing satisfactory security service in IoT systems is indispensable to its mission critical applications. However, limited resources prevent full security coverage at all times. Therefore, these limited resources must be deployed intelligently by considering differences in priorities of targets that require security coverage. In this study, we have developed a new application of Cognitive Radio (CR) technology for IoT systems and provide an appropriate security solution that will enable IoT to be more affordable and applicable than it is currently. To resolve the security-related resource allocation problem, game theory is a suitable and effective tool. Based on the Blotto game model, we propose a new strategic power allocation scheme to ensure secure CR communications. A simulation shows that our proposed scheme can effectively respond to current system conditions and perform more effectively than other existing schemes in dynamically changeable IoT environments.

네트워크 보안을 위한 침입차단 시스템과 운영체제 보안 기능 모델링 및 시뮬레이션 (Modeling and Simulation of Firewall System and Security Functions of Operating System for Network Security)

  • 김태헌;이원영;김형종;김홍근;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제11권2호
    • /
    • pp.1-16
    • /
    • 2002
  • The need for network security is being increasing due to the development of information communication and internet technology. In this paper, firewall models, operating system models and other network component models are constructed. Each model is defined by basic or compound model, referencing DEVS formalism. These models and the simulation environment are implemented with MODSIM III, a general purpose, modular, block-structured high-level programming language which provides direct support for object-oriented programming and discrete-event simulation. In this simulation environment with representative attacks, the following three attacks are generated, SYN flooding and Smurf attack as an attack type of denial of service, Mail bomb attack as an attack type of e-mail. The simulation is performed with the models that exploited various security policies against these attacks. The results of this study show that the modeling method of packet filtering system, proxy system, unix and windows NT operating system. In addition, the results of the simulation show that the analysis of security performance according to various security policies, and the analysis of correlation between availability and confidentiality according to security empowerment.

  • PDF

Simulation of Detecting the Distributed Denial of Service by Multi-Agent

  • Seo, Hee-Suk;Lee, Young-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.59.1-59
    • /
    • 2001
  • The attackers on Internet-connected systems we are seeing today are more serious and more technically complex than those in the past. Computer security incidents are different from many other types of crimes because detection is unusually difficult. So, network security managers need a IDS and Firewall. IDS (Intrusion Detection System) monitors system activities to identify unauthorized use, misuse or abuse of computer and network system. It accomplishes these by collecting information from a variety of systems and network resources and then analyzing the information for symptoms of security problems. A Firewall is a way to restrict access between the Internet and internal network. Usually, the input ...

  • PDF

VoIP 스팸 탐지 기술의 성능 평가를 위한 모델링 및 시물레이션 (Modeling and Simulation for Performance Evaluation of VoIP Spam Detection Mechanism)

  • 김지연;김형종;김명주;정종일
    • 정보보호학회논문지
    • /
    • 제19권3호
    • /
    • pp.95-105
    • /
    • 2009
  • 본 논문은 VoIP의 주요 보안 위협인 스팸에 대응하기 위한 목적으로 VoIP 스팸 탐지 기술의 성능평가를 위한 시뮬레이션 모델을 설계하고 있다. 성능평가 시뮬레이션 모델은 입력 데이터를 제공하는 기능과 출력 데이터를 분석하는 기능을 갖는다. 본 논문에서는 VoIP스팸 탐지 기술의 성능평가 입력 데이터를 위하여 VoIP 발신자 특성을 고려하여 네 종류의 Caller 모델을 개발하였고, 각 caller 모델은 결정된 패턴 내에서 call을 생성하게 된다. 성능평가는 SPIT (Spam over Internet Telephony) Level 결정 알고리즘을 대상으로 수행하고, 성능평가의 지표 도출을 통해 평가 알고리즘의 성능 지수를 산정한다. 성능평가 모델은 DEVS 형식론 기반으로 설계하였으며 DEVSJAVA$^{TM}$를 이용한 모델링 및 시뮬레이션을 통해 설계된 모델을 검증하였다.