Title
A modeling methodology for cyber-security simulation
Abstract
With the increasing occurrence of various cyber-attacks such as distributed denial of service (DDoS) and worm attacks, simulations are being used to develop security techniques and policies against such attacks. In a cyber-security environment, there are many entities that have different resources and behaviors; attack and defensive behaviors are exhibited upon interaction with other entities. In order to design simulation models for various cyber-security simulations, not only a generalized model that can represent various attacks and target entities but also a modeling method that considers different types of interactions between entities to make simulation models should be developed. In this paper, we describe a modeling methodology for the cyber-security simulation based on discrete event system specification (DEVS) formalism.
Year
DOI
Venue
2012
10.5555/2429759.2430248
Winter Simulation Conference
Keywords
Field
DocType
various cyber-security simulation,simulation model,cyber-security simulation,cyber-security environment,modeling method,different resource,various attack,various cyber-attacks,modeling methodology,different type
Denial-of-service attack,Computer science,Computer security,Simulation,Simulation modeling,DEVS,Formalism (philosophy)
Conference
ISBN
Citations 
PageRank 
978-1-4799-2077-8
0
0.34
References 
Authors
1
2
Name
Order
Citations
PageRank
Ji-Yeon Kim100.34
Hyung-Jong Kim227827.13