使用河床建模器建模和模拟网络安全的大规模网络效应

Rajiv Parwani, H. Al-Amoudi, Abdul Jhummarwala
{"title":"使用河床建模器建模和模拟网络安全的大规模网络效应","authors":"Rajiv Parwani, H. Al-Amoudi, Abdul Jhummarwala","doi":"10.1109/Confluence47617.2020.9058026","DOIUrl":null,"url":null,"abstract":"Organizations have moved towards service based architectures and applications are hosted in the Clouds. An interruption in online delivery of such services is of grave concern to the organizations as it causes problems to a large number of users. The identification of the security vulnerability in these systems which can be exploited by cybercriminals is of utmost importance when developing an architecture for online hosting of applications. Defensive capabilities to thwart the cybercriminals must be deployed. A Distributed Denial of Service (DDoS) attack is commonly employed to create panic and prevent the delivery of services to legitimate users. This paper presents the use of network security simulation and modeling for understanding the effect of cyberattacks such as DDoS on a system. Experimentations conducted include deployment of services such as FTP, Email, and HTTP in a simulated environment. The main aim is to simulate network infrastructure and security policies before online deployment of the services. As these services will be used by a large number of users concurrently, it would be important to create a resilient system against modern DDoS attacks. The observations from the simulations will allow to share and expand the knowledge of the users for development of secure systems.","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Modeling and Simulating large scale Cyber Effects for Cybersecurity using Riverbed Modeler\",\"authors\":\"Rajiv Parwani, H. Al-Amoudi, Abdul Jhummarwala\",\"doi\":\"10.1109/Confluence47617.2020.9058026\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Organizations have moved towards service based architectures and applications are hosted in the Clouds. An interruption in online delivery of such services is of grave concern to the organizations as it causes problems to a large number of users. The identification of the security vulnerability in these systems which can be exploited by cybercriminals is of utmost importance when developing an architecture for online hosting of applications. Defensive capabilities to thwart the cybercriminals must be deployed. A Distributed Denial of Service (DDoS) attack is commonly employed to create panic and prevent the delivery of services to legitimate users. This paper presents the use of network security simulation and modeling for understanding the effect of cyberattacks such as DDoS on a system. Experimentations conducted include deployment of services such as FTP, Email, and HTTP in a simulated environment. The main aim is to simulate network infrastructure and security policies before online deployment of the services. As these services will be used by a large number of users concurrently, it would be important to create a resilient system against modern DDoS attacks. The observations from the simulations will allow to share and expand the knowledge of the users for development of secure systems.\",\"PeriodicalId\":180005,\"journal\":{\"name\":\"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Confluence47617.2020.9058026\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Confluence47617.2020.9058026","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

组织已经转向基于服务的体系结构,应用程序托管在云中。这类服务的在线提供中断是各组织严重关切的问题,因为这会给大量用户带来问题。在开发应用程序在线托管架构时,识别这些系统中可能被网络罪犯利用的安全漏洞至关重要。必须部署防御能力以挫败网络罪犯。分布式拒绝服务(DDoS)攻击通常用于制造恐慌并阻止向合法用户提供服务。本文介绍了使用网络安全模拟和建模来理解网络攻击(如DDoS)对系统的影响。进行的实验包括在模拟环境中部署FTP、Email和HTTP等服务。其主要目的是在在线部署服务之前模拟网络基础设施和安全策略。由于这些服务将由大量用户同时使用,因此创建一个抵御现代DDoS攻击的弹性系统非常重要。从模拟的观察将允许分享和扩展用户的知识,以开发安全系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Modeling and Simulating large scale Cyber Effects for Cybersecurity using Riverbed Modeler
Organizations have moved towards service based architectures and applications are hosted in the Clouds. An interruption in online delivery of such services is of grave concern to the organizations as it causes problems to a large number of users. The identification of the security vulnerability in these systems which can be exploited by cybercriminals is of utmost importance when developing an architecture for online hosting of applications. Defensive capabilities to thwart the cybercriminals must be deployed. A Distributed Denial of Service (DDoS) attack is commonly employed to create panic and prevent the delivery of services to legitimate users. This paper presents the use of network security simulation and modeling for understanding the effect of cyberattacks such as DDoS on a system. Experimentations conducted include deployment of services such as FTP, Email, and HTTP in a simulated environment. The main aim is to simulate network infrastructure and security policies before online deployment of the services. As these services will be used by a large number of users concurrently, it would be important to create a resilient system against modern DDoS attacks. The observations from the simulations will allow to share and expand the knowledge of the users for development of secure systems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Identification of the most efficient algorithm to find Hamiltonian Path in practical conditions Segmentation and Detection of Road Region in Aerial Images using Hybrid CNN-Random Field Algorithm A Novel Approach for Isolation of Sinkhole Attack in Wireless Sensor Networks Performance Analysis of various Information Platforms for recognizing the quality of Indian Roads Time Series Data Analysis And Prediction Of CO2 Emissions
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1