Attack Modeling for an Internet Security Simulation


The KIPS Transactions:PartC, Vol. 11, No. 2, pp. 183-192, Apr. 2004
10.3745/KIPSTC.2004.11.2.183,   PDF Download:

Abstract

As the use of the Internet has explosively increased, it is likely for the Internet to be exposed to various attacks. Modeling the Internet attacks is essential to simulate the attacks. However, the existing studies on attack modeling have mainly focused on classifying and categorizing the attacks and consequently they are not suitable to representing attack scenarios in the Internet security simulation. In this paper, we introduce the existing methods of attack modeling, and propose an adapted attack modeling to properly express the properties for the Internet security simulator. The adapted attack modeling suggests a solution to the problems of the existing attack tree modelings, such as difficulty of composing complex scenarios, ambiguity of attack sequence, lack of system state information. And it can represent simultaneous, precise time-dependent attack, and attack period, which are nearly impossible to be represented in many other existing methods.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. J. Gug, C. G. Hui, J. G. Hyeon, P. S. Gyu, S. J. Hong, "Attack Modeling for an Internet Security Simulation," The KIPS Transactions:PartC, vol. 11, no. 2, pp. 183-192, 2004. DOI: 10.3745/KIPSTC.2004.11.2.183.

[ACM Style]
Seo Jeong Gug, Choe Gyeong Hui, Jeong Gi Hyeon, Park Seung Gyu, and Sim Jae Hong. 2004. Attack Modeling for an Internet Security Simulation. The KIPS Transactions:PartC, 11, 2, (2004), 183-192. DOI: 10.3745/KIPSTC.2004.11.2.183.