The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks

The paper outlines a bioinspired approach named “network nervous system" and methods of simulation of infrastructure attacks and protection mechanisms based on this approach. The protection mechanisms based on this approach consist of distributed prosedures of information collection and processing, which coordinate the activities of the main devices of a computer network, identify attacks, and determine nessesary countermeasures. Attacks and protection mechanisms are specified as structural models using a set-theoretic approach. An environment for simulation of protection mechanisms based on the biological metaphor is considered; the experiments demonstrating the effectiveness of the protection mechanisms are described.

[1]  Arnold Suvatne Improved Worm Simulator and Simulations , 2010 .

[2]  Igor V. Kotenko,et al.  Simulation of Protection Mechanisms against Botnets on the Basis of "Nervous Network" Framework , 2012, SIMULTECH.

[3]  Angelos D. Keromytis,et al.  A cooperative immunization system for an untrusting Internet , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..

[4]  Christoph P. Mayer,et al.  Large-scale evaluation of distributed attack detection , 2009, SimuTools.

[5]  Andrey Shorov,et al.  AGENT‑BASED MODELING AND SIMULATION OF BOTNETS AND BOTNET DEFENSE , 2010 .

[6]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[7]  Lixia Zhang,et al.  A taxonomy of biologically inspired research in computer networking , 2010, Comput. Networks.

[8]  Jyotsna Krishnaswamy,et al.  The Undersigned Project Committee Approves the Project Titled WORMULATOR : A SIMULATOR FOR RAPIDLY SPREADING MALWARE by , 2018 .

[9]  Falko Dressler Bio-inspired mechanisms for efficient and adaptive network security mechanisms , 2005, Service Management and Self-Organization in IP-based Networks.

[10]  Yong Tang,et al.  Slowing down Internet worms , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[11]  Matthew M. Williamson,et al.  Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[12]  Kai Hwang,et al.  Collaborative Detection of DDoS Attacks over Multiple Network Domains , 2007, IEEE Transactions on Parallel and Distributed Systems.

[13]  Igor V. Kotenko,et al.  Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks , 2013, 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing.

[14]  Scott Shenker,et al.  Epidemic algorithms for replicated database maintenance , 1988, OPSR.

[15]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[16]  Wenke Lee,et al.  Simulating Internet worms , 2004, The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004. (MASCOTS 2004). Proceedings..

[17]  Aziz Mohaisen,et al.  Losing control of the internet: using the data plane to attack the control plane , 2010, CCS '10.

[18]  Jun Li,et al.  SAVE: source address validity enforcement protocol , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[19]  Brian W. Unger,et al.  Applying parallel discrete event simulation to network emulation , 2000, Proceedings Fourteenth Workshop on Parallel and Distributed Simulation.

[20]  Kotagiri Ramamohanarao,et al.  Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring , 2004, NETWORKING.

[21]  Philippe Owezarski,et al.  A trace based method for realistic simulation , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[22]  Marco Dorigo,et al.  AntNet: Distributed Stigmergetic Control for Communications Networks , 1998, J. Artif. Intell. Res..

[23]  Igor V. Kotenko,et al.  Agent‐based simulation of cooperative defence against botnets , 2012, Concurr. Comput. Pract. Exp..

[24]  Bernhard Plattner,et al.  Experiences with worm propagation simulations , 2003, WORM '03.