Abstract
We propose the use of discrete event system specification (DEVS) in the transient time analysis of network security survivability. By doing the analysis with the time element, it is possible to predict the exact behaviors of attacked system with respect to time. In this work, we create a conceptual model with DEVS and simulate based on time and state variables change when events occur. Our purpose is to illustrate the unknown attacks’ features where a variety of discrete events with various attacks occur at diverse times. Subsequently, the response methods would be performed more precisely and this is a way to increase the survivability level in the target environment. It can also be used to predict the survivability attributes of complex systems while they are under development and preventing costly vulnerabilities before the system is built.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aung, K.M.M., Park, J.S.: Software Rejuvenation Approach to Security Engineering. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 574–583. Springer, Heidelberg (2004)
Aung, K.M.M.: The Optimum Time to Perform Software Rejuvenation for Survivability. In: IASTED, SE 2004, Int. Conf., Innsbruck, Austria, pp. 292–296 (2004)
Chung, M., Mukherjee, B., Olsson, R.A., Puketza, N.: Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions. In: Proc. of the 18th NISSC (1995)
Cohen, F.: Simulating Cyber Attacks, Defenses, and Consequences. In: IEEE Symposium on Security and Privacy, Berkeley, CA (1999)
Fisher, D.A.: Design and Implementation of EASEL-A Language for Simulating Highly Distributed Systems. In: Proceedings of MacHack, the 14th Annual Conference for Leading Edge Developers, Deerborn, MI, June 24-26 (1999)
Fisher, D.A.: Survivability and Simulation. In: Okamoto, E., Pieprzyk, J.P., Seberry, J. (eds.) ISW 2000. LNCS, vol. 1975. Springer, Heidelberg (2000)
Moitra, S.D., Konda, S.L.: Simulating Cyber Attacks, Defenses, and Consequences. In: IEEE Symposium on Security and Privacy, Berkeley, CA (1999)
Zeigler, B.P.: Multifacetted Modelling and Discrete Event Simulation. Academic Press, London (1984)
Zeigler, B.P.: Object-Oriented Simulation with Hierarchical Modular Models: Intelligent Agents and Endomorphic Systems. Academic Press, Boston (1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, J.S., Aung, K.M.M. (2005). Transient Time Analysis of Network Security Survivability Using DEVS. In: Kim, T.G. (eds) Artificial Intelligence and Simulation. AIS 2004. Lecture Notes in Computer Science(), vol 3397. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30583-5_64
Download citation
DOI: https://doi.org/10.1007/978-3-540-30583-5_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24476-9
Online ISBN: 978-3-540-30583-5
eBook Packages: Computer ScienceComputer Science (R0)