Simulation of Bio-inspired Security Mechanisms against Network Infrastructure Attacks

The paper considers development of the approach to simulation of protection mechanisms against infrastructure attacks based on biological metaphor. The specification of models of attacks and protection mechanisms is given. The environment for security mechanisms simulation based on biological metaphor is studied, experiments that demonstrate possibilities of the designed simulation system are carried out.

[1]  Yong Tang,et al.  Slowing down Internet worms , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[2]  Igor V. Kotenko,et al.  Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks , 2013, 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing.

[3]  Thomas Gamer,et al.  Large-scale evaluation of distributed attack detection , 2009, SIMUTools 2009.

[4]  Matthew M. Williamson,et al.  Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[5]  Philippe Owezarski,et al.  A trace based method for realistic simulation , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[6]  Brian W. Unger,et al.  Applying parallel discrete event simulation to network emulation , 2000, Proceedings Fourteenth Workshop on Parallel and Distributed Simulation.

[7]  Aziz Mohaisen,et al.  Losing control of the internet: using the data plane to attack the control plane , 2010, CCS '10.

[8]  Bernhard Plattner,et al.  Experiences with worm propagation simulations , 2003, WORM '03.

[9]  Léon J. M. Rothkrantz,et al.  Ant-Based Load Balancing in Telecommunications Networks , 1996, Adapt. Behav..

[10]  Dipankar Dasgupta,et al.  Immuno-inspired autonomic system for cyber defense , 2007, Inf. Secur. Tech. Rep..

[11]  Wenke Lee,et al.  Simulating Internet worms , 2004, The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004. (MASCOTS 2004). Proceedings..

[12]  Jun Li,et al.  SAVE: source address validity enforcement protocol , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[13]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[14]  Lixia Zhang,et al.  A taxonomy of biologically inspired research in computer networking , 2010, Comput. Networks.

[15]  Andrey Shorov,et al.  AGENT‑BASED MODELING AND SIMULATION OF BOTNETS AND BOTNET DEFENSE , 2010 .

[16]  Scott Shenker,et al.  Epidemic algorithms for replicated database maintenance , 1988, OPSR.

[17]  Falko Dressler Bio-inspired mechanisms for efficient and adaptive network security mechanisms , 2005, Service Management and Self-Organization in IP-based Networks.