Simulation Models for the Evaluation of Detection and Defense Protocols against Cyber Attacks - Preparation of Doctoral Consortium Contributions

Lorena Paulina Valdiviezo

2014

Abstract

Issues related to Cyber Security aspects, mainly focused on the security of computer systems and the services they offer, have gained considerable importance. The companies and even national governments, are incessantly affected by these issues to ensure the integrity of information systems and data managed through occurring in networked environments. Distributed Denial of Service (DDoS) flooding attack is one of the most diffused and effective threat against services and applications running over the Internet, in this sense, the research is primarily aimed at the study (assessment and validation) of hybrid models for detection, defense and response (R) for DDoS attacks, especially in the application layer, and the identification of new strategies. This research is based on modelling and simulating different scenarios using NeSSi2 and ns-3 as network simulation tools.

References

  1. Carneiro, G., H. Fontes, M. Ricardo. 2011. Fast prototyping of network protocols through ns-3 simulation model reuse. Simulation Modelling Practice and Theory 19 (9): 2063 - 2075.
  2. Duarte, José. 2012. Identificación de Ataques Informáticos a través de Redes Bayesianas. Editorial académica española. ISBN:978-3-659-00652-4
  3. Furfaro, A., Pace, P., Parise, A., Molina, L. 2014, July. Modelling and Simulation of a defense strategy to face indirect DDoS flooding attacks. 7th International Conference on Internet and Distributed Computing Systems.
  4. Grunewald, D., Lützenberger, M., Chinnow, J., Bye, R., Bsufka, K., Albayrak, S.2011. Agent-based Network Security Simulation (Demonstration). DAI-Labor | TU Berlin | Ernst-Reuter-Platz 7 | 10587 Berlin, Germany.
  5. Hirsch B., Konnerth, T., Heßler A. 2009. Merging agents
  6. and services - the JIAC agent platform. In Multi-Agent Programming: Languages, Tools and Applications, pages 159-185. Springer.
  7. Kumar, P., S. Selvakumar. 2009, March. Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms. In Advance Computing Conference, 2009. IACC 2009. IEEE International, 1275-1280.
  8. Liu, Xin., Yang, Xiaowei, Lu Yanbin. 2008. To Filter or to Authorize: Network-Layer DoS Defense against Multimillion-node Botnets. ACM SIGCOMM'08, Seattle, Washington, USA.
  9. Ns-3 Manual. 2014. Release ns-3.20. http://www.nsnam. org/docs/release/3.20/manual/ns-3-manual.pdf.
  10. Neinbe, J. 2010. Log Analyzer for Network Forensics and Incident Reporting. International Conference on Intelligent System, Modeling and Simulation. IEEE Computer Society 978-0-7695-3973-7/10, p356-361.
  11. Patrikakis, C., Masikos, M., Zouraraki O. 2004. Distributed Denial of Service Attacks. The Internal Protocol Journal. Volume 7, Number 4, p13-35..
  12. Peng, T., C. Leckie, K. Ramamohanarao. 2007, April. Survey of Network-based Defense Mechanisms Countering the DoS and DDoS Problems. ACM Comput. Surv. 39 (1).
  13. Ramroop S. 2011. A DiffServ model for the NS-3 simulator. http://www.eng.uwi.tt/depts/elec/staff/ rvadams/sramroop/index.htm.
  14. Schmidt, Stephan., Bye, Rainer., Chinnow, Joël. 2008. Application-level simulation for network security. DAI-Labor, Berlin Institute of Technology.
  15. Yu, S., Zhou W. 2010. Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks. Sixth Annual IEEE International Conference on Pervasive Computing and Communications.
  16. Zargar, S. T., J. Joshi, D. Tipper. 2013. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Communications Surveys & Tutorials 15 (4): 2046- 2069.
Download


Paper Citation


in Harvard Style

Valdiviezo L. (2014). Simulation Models for the Evaluation of Detection and Defense Protocols against Cyber Attacks - Preparation of Doctoral Consortium Contributions . In Doctoral Consortium - DCSIMULTECH, (SIMULTECH 2014) ISBN Not Available, pages 42-47


in Bibtex Style

@conference{dcsimultech14,
author={Lorena Paulina Valdiviezo},
title={Simulation Models for the Evaluation of Detection and Defense Protocols against Cyber Attacks - Preparation of Doctoral Consortium Contributions},
booktitle={Doctoral Consortium - DCSIMULTECH, (SIMULTECH 2014)},
year={2014},
pages={42-47},
publisher={SciTePress},
organization={INSTICC},
doi={},
isbn={Not Available},
}


in EndNote Style

TY - CONF
JO - Doctoral Consortium - DCSIMULTECH, (SIMULTECH 2014)
TI - Simulation Models for the Evaluation of Detection and Defense Protocols against Cyber Attacks - Preparation of Doctoral Consortium Contributions
SN - Not Available
AU - Valdiviezo L.
PY - 2014
SP - 42
EP - 47
DO -