Skip to main content

Transient Time Analysis of Network Security Survivability Using DEVS

  • Conference paper
Artificial Intelligence and Simulation (AIS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3397))

Abstract

We propose the use of discrete event system specification (DEVS) in the transient time analysis of network security survivability. By doing the analysis with the time element, it is possible to predict the exact behaviors of attacked system with respect to time. In this work, we create a conceptual model with DEVS and simulate based on time and state variables change when events occur. Our purpose is to illustrate the unknown attacks’ features where a variety of discrete events with various attacks occur at diverse times. Subsequently, the response methods would be performed more precisely and this is a way to increase the survivability level in the target environment. It can also be used to predict the survivability attributes of complex systems while they are under development and preventing costly vulnerabilities before the system is built.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aung, K.M.M., Park, J.S.: Software Rejuvenation Approach to Security Engineering. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 574–583. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Aung, K.M.M.: The Optimum Time to Perform Software Rejuvenation for Survivability. In: IASTED, SE 2004, Int. Conf., Innsbruck, Austria, pp. 292–296 (2004)

    Google Scholar 

  3. Chung, M., Mukherjee, B., Olsson, R.A., Puketza, N.: Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions. In: Proc. of the 18th NISSC (1995)

    Google Scholar 

  4. Cohen, F.: Simulating Cyber Attacks, Defenses, and Consequences. In: IEEE Symposium on Security and Privacy, Berkeley, CA (1999)

    Google Scholar 

  5. Fisher, D.A.: Design and Implementation of EASEL-A Language for Simulating Highly Distributed Systems. In: Proceedings of MacHack, the 14th Annual Conference for Leading Edge Developers, Deerborn, MI, June 24-26 (1999)

    Google Scholar 

  6. Fisher, D.A.: Survivability and Simulation. In: Okamoto, E., Pieprzyk, J.P., Seberry, J. (eds.) ISW 2000. LNCS, vol. 1975. Springer, Heidelberg (2000)

    Google Scholar 

  7. Moitra, S.D., Konda, S.L.: Simulating Cyber Attacks, Defenses, and Consequences. In: IEEE Symposium on Security and Privacy, Berkeley, CA (1999)

    Google Scholar 

  8. Zeigler, B.P.: Multifacetted Modelling and Discrete Event Simulation. Academic Press, London (1984)

    MATH  Google Scholar 

  9. Zeigler, B.P.: Object-Oriented Simulation with Hierarchical Modular Models: Intelligent Agents and Endomorphic Systems. Academic Press, Boston (1990)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, J.S., Aung, K.M.M. (2005). Transient Time Analysis of Network Security Survivability Using DEVS. In: Kim, T.G. (eds) Artificial Intelligence and Simulation. AIS 2004. Lecture Notes in Computer Science(), vol 3397. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30583-5_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30583-5_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24476-9

  • Online ISBN: 978-3-540-30583-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics