Framework for Infrastructure Attack Modeling in Hybrid Networks

Framework for Infrastructure Attack Modeling in Hybrid Networks

Konstantin Borisenko, Ivan Kholod, Andrey Shorov
DOI: 10.4018/IJMCMC.2014100106
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The paper considers a framework for modeling infrastructure attacks and protection mechanisms in hybrid networks. The developed framework saves time conducting tests and improves the accuracy of the experiments by connection the simulation system to real network nodes. The paper shows formal description of the modeling system components. Modeling system architecture and implementation are shown. The authors also describe modeling system verification. In addition, they provide the experiments devoted to DDoS attacks and operation of the protection techniques.
Article Preview
Top

In the last few years there have been a great number of works in the area of the modeling network protection against infrastructure attacks.

In (Siaterlis et al., 2013) the Emulab system is suggested for experimental research aimed at studying network threats and computer network security. This software allows us to design virtual networks with various topologies and simulate client behavior. Thus, it is possible to set attack scenarios and implement protection algorithms.

The DETER testbed (Mirkovic et al., 2007) is intended for simulating various network threats and testing protection techniques against them. When modeling DoS and DDoS attacks, we can point out three main components: network topology, legitimate and malicious traffic. Such a system allows fast network construction with a large number of nodes, simulation of different situations connected with attack performance, and study of the efficiency of protection mechanisms against these attacks.

The paper (Konovalov et al., 2013) deals with the development of a simulation system for DDoS attacks. This system allows us to simulate a network with different behavior of clients inside it. The authors described the system and also provided the results of testing the known methods of DDoS attack protection. Furthermore, their own protection methods were developed and tested. Unlike the system described we have developed a system with the possible connection of real nodes to a virtual network for improving the accuracy of the experiments conducted.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing