Agent-based modelling and simulation of network cyber-attacks and cooperative defence mechanisms

نویسنده

  • Igor Kotenko
چکیده

The important problem in network security which solution is urgently needed is the investigation of counteraction between malefactors and defence systems in computer networks, including the Internet, and the creation of effective cyber-defence systems. It is important to underline that experienced malefactors realize sophisticated strategies of cyber-attacks. These strategies can include:  Information gathering about the computer system under attack, detecting its vulnerabilities and defence mechanisms;  Determining the ways of overcoming defence mechanisms (for example, by simulating these mechanisms);  Suppression, detour or deceit of protection components (for example, by using slow (“stretched” in time) stealthy probes, separate coordinated operations (attacks) from several sources formed complex multiphase attack, etc.);  Getting access to resources, escalating privilege, and implementation of thread intended (violation of confidentiality, integrity, availability, etc.) using the vulnerabilities detected;  Covering tracks of malefactors’ presence and creating back doors. Defence mechanisms should support real-time fulfilment of the following operations:  Implementing the protection mechanisms appropriated to the security policy (including proactive intrusion prevention and attack blocking, misinformation, concealment, camouflage, etc.);  Vulnerability assessment, gathering data and analysis of the current status of the computer system defended;  Intrusion detection and prediction of the malefactors’ intentions and actions;  Direct incident response, including deception of the malefactors, their decoy with the purpose of disclosure and more precise determining the malefactors’ purposes, and reinforcement of critical protection mechanisms;  Elimination of intrusion consequences and detected vulnerabilities, adaptation of the information assurance system to the next intrusions. 1

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Agent-based Modeling and Simulation of Cyber-warfare between Malefactors and Security Agents in Internet

The paper considers an approach to modeling and simulation of cyber-wars in Internet between the teams of software agents. Each team is a community of agents cloned on various network hosts. The approach is considered by an example of modeling and simulation of “Distributed Denial of Service” (DDoS) attacks and protection against them. Agents of different teams compete to reach antagonistic int...

متن کامل

Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

متن کامل

Agent-based Modeling and Simulation of Botnets and Botnet Defense

Nowadays we are witnesses of the rapid spread of botnets across the Internet and using them for different cyber attacks against our systems. Botnets join a huge number of compromised computers in the Internet and allow using these computers for performing vulnerability scans, distributing denial-of-service (DDoS) attacks and sending enormous amounts of spam emails. It is a very complex task to ...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Infrastructures protection based on heterogeneous networks

This paper presents a modelling approach for mapping cyber defence issues with respect to heterogeneous networks; the research is devoted to develop an agent-driven simulation environment able to analyse this problem considering different layers including CIS capabilities, operational issues, system architecture, management processes and human factors. The paper analyses a specific case study t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012