EA-CPNsim: A CPN-Based Simulation Platform for Analysis and Defense Design of Internet End-Systems Targeted Attacks

A real-time discrete event simulation platform for Internet end-system targeted attacks, EA-CPNsim, is presented in this paper. This platform provides support for modeling the targeted end-systems behavior and the attack effect, helping the system administrator chooses and verifies the defense schemes, and evaluating the system consequences. EA-CPNsim is constructed based on the CPN tools, a widespread tool for simulating and analyzing CP-nets. CPN pattern database and control algorithm database are extended to be used for the simulation of attacker and victim system's running behavior. Different from other Internet attack simulation platforms, EACPNsim realizes that: (i) hierarchical and modular modeling for simplifying the abstraction of simulation target.(ii) adopting distributed style on simulator deployment to balance the overload between object simulation and numerical decision, so as to improving the ability of simulation.(iii) Auto CPnets generation based on the template library constructed first for simplifying user operation. A simple example of a attack defense analysis is used to illustrate the validity of our platform at last.

[1]  Mina Guirguis,et al.  Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[2]  Lars Michael Kristensen,et al.  Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems , 2007, International Journal on Software Tools for Technology Transfer.

[3]  David E. Culler,et al.  USENIX Association Proceedings of USITS ’ 03 : 4 th USENIX Symposium on Internet Technologies and Systems , 2003 .

[4]  Yuting Zhang,et al.  Adversarial exploits of end-systems adaptation dynamics , 2007, J. Parallel Distributed Comput..

[5]  Giorgio Ventre,et al.  Network Simulator NS2 , 2008 .

[6]  Mario Gerla,et al.  A Modular and Scalable Simulation Tool for Large Wireless Networks , 1998, Computer Performance Evaluation.

[7]  Yuting Zhang,et al.  Reduction of quality (RoQ) attacks on Internet end-systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[8]  Kevin J. Houle,et al.  Trends in Denial of Service Attack Technology , 2001 .