Modeling and simulation in security evaluation

被引:17
|
作者
Nicol, DM [1 ]
机构
[1] Univ Illinois, Urbana, IL 61801 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/MSP.2005.129
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The role played by modeling and simulation in security evaluation is discussed. The useful way to use simulation is to assess proposed security measures costs and limitations with respect to given application as security measures affect system performance. Another use of simulation integrates physical devices, such as routers, computer hosts, and network sensors, with simulated environments. Simulated traffic generation is necessary for studying Internet-scale phenomenon such as worms in which growth characteristics are important. Simulation can also help in identifying new vulnerabilities.
引用
下载
收藏
页码:71 / 74
页数:4
相关论文
共 50 条
  • [1] TrainSec: A Simulation Framework for Security Modeling and Evaluation in CBTC Networks
    Fakhereldine, Amin
    Zulkernine, Mohammad
    Murdock, Dan
    RELIABILITY, SAFETY, AND SECURITY OF RAILWAY SYSTEMS, RSSRAIL 2023, 2023, 14198 : 22 - 39
  • [2] A distributed simulation framework for modeling cyber attacks and the evaluation of security measures
    Ashtiani, Mehrdad
    Azgomi, Mohammad Abdollahi
    SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2014, 90 (09): : 1071 - 1102
  • [3] Modeling and Simulation for Homeland Security
    Stamber, K. L.
    Brown, T. J.
    Pless, D. J.
    Berscheid, A.
    20TH INTERNATIONAL CONGRESS ON MODELLING AND SIMULATION (MODSIM2013), 2013, : 1103 - 1109
  • [4] Modeling and Simulation in Homeland Security
    Ding, Amy
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2007, 4 (04): : 295 - 297
  • [5] Modeling and simulation of distributed security models
    Seo, HS
    Cho, TH
    Chi, SD
    COMPUTATIONAL SCIENCE - ICCS 2003, PT IV, PROCEEDINGS, 2003, 2660 : 809 - 818
  • [6] Modeling and Simulation Techniques for Maritime Security
    Leathrum, James F., Jr.
    Mathew, Reejo
    Mastaglio, Thomas W.
    2009 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2009, : 628 - +
  • [7] Simulation modeling for maritime port security
    Harris, Stephen P.
    Dixon, David S.
    Dunn, David L.
    Romich, Andrew N.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2013, 10 (02): : 193 - 201
  • [8] Social Modeling and Simulation for National Security
    Resnyansky, Lucy
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2012, 31 (01) : 17 - 25
  • [9] Modeling of information systems to their security evaluation
    Zegzhda, D.
    Zegzhda, P.
    Pechenkin, A.
    Poltavtseva, M.
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 295 - 298
  • [10] Pensieve: Microarchitectural Modeling for Security Evaluation
    Yang, Yuheng
    Bourgeat, Thomas
    Lau, Stella
    Yan, Mengjia
    PROCEEDINGS OF THE 2023 THE 50TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, ISCA 2023, 2023, : 828 - 842