Simulating non-stationary congestion systems using splitting with applications to cyber security

According to the former counterterrorism czar, Richard A. Clarke (2010), our national infrastructure could be severely damaged in 15 minutes by a cyber attack. A worm attack on an Internet Protocol (IP) network is one type of attack that is possible. Such an attack would result in a non-stationary arrival process of packets on a link in the network. In this paper we present an initial use of our Optimal Splitting Technique for Rare Events (OSTRE) to simulate the congestion imposed by the worm on the link. This initial application is oriented to testing the technique in this dynamic environment and report on its use as compared with conventional simulations.

[1]  Hsiao-Chang Chen,et al.  Optimal budget allocation for discrete-event simulation experiments , 2009 .

[2]  Donald F. Towsley,et al.  On the performance of Internet worm scanning strategies , 2006, Perform. Evaluation.

[3]  Richard A. Clarke,et al.  Cyber War: The Next Threat to National Security and What to Do About It , 2010 .

[4]  Ray Bert,et al.  Cyber War: The Next Threat to National Security and What to Do About It , by Richard A. Clarke and Robert K. Knake. New York: HarperCollins, 2010. , 2010 .

[5]  Chun-Hung Chen,et al.  Intelligent simulation for alternatives comparison and application to air traffic management , 2005 .

[6]  Donald F. Towsley,et al.  Worm propagation modeling and analysis under dynamic quarantine defense , 2003, WORM '03.

[7]  Julia H. Allen Information Security as an Institutional Priority , 2005 .

[8]  Robert B. Cooper,et al.  Queueing systems, volume II: computer applications : By Leonard Kleinrock. Wiley-Interscience, New York, 1976, xx + 549 pp. , 1977 .

[9]  Chun-Hung Chen,et al.  A preliminary study of optimal splitting for rare-event simulation , 2008, 2008 Winter Simulation Conference.

[10]  Pierre L'Ecuyer,et al.  Software for uniform random number generation: distinguishing the good and the bad , 2001, Proceeding of the 2001 Winter Simulation Conference (Cat. No.01CH37304).

[11]  John F. Shortle,et al.  Optimal splitting for rare-event simulation , 2012 .

[12]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.

[13]  Weibo Gong,et al.  Email Virus Propagation Modeling and Analysis , 2003 .

[14]  G. J. A. Stern,et al.  Queueing Systems, Volume 2: Computer Applications , 1976 .

[15]  David M. Nicol,et al.  Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure , 2003, Computer Performance Evaluation / TOOLS.

[16]  Simon Liu,et al.  Cyberattacks: Why, What, Who, and How , 2009, IT Professional.

[17]  Loo Hay Lee,et al.  Efficient Simulation Budget Allocation for Selecting an Optimal Subset , 2008, INFORMS J. Comput..

[18]  Pierre L'Ecuyer,et al.  An Object-Oriented Random-Number Package with Many Long Streams and Substreams , 2002, Oper. Res..