M. J. Fischer, D. Masi, J. Shortle, Chun-Hung Chen
{"title":"利用网络安全应用程序拆分模拟非稳态拥塞系统","authors":"M. J. Fischer, D. Masi, J. Shortle, Chun-Hung Chen","doi":"10.1109/WSC.2010.5678981","DOIUrl":null,"url":null,"abstract":"According to the former counterterrorism czar, Richard A. Clarke (2010), our national infrastructure could be severely damaged in 15 minutes by a cyber attack. A worm attack on an Internet Protocol (IP) network is one type of attack that is possible. Such an attack would result in a non-stationary arrival process of packets on a link in the network. In this paper we present an initial use of our Optimal Splitting Technique for Rare Events (OSTRE) to simulate the congestion imposed by the worm on the link. This initial application is oriented to testing the technique in this dynamic environment and report on its use as compared with conventional simulations.","PeriodicalId":272260,"journal":{"name":"Proceedings of the 2010 Winter Simulation Conference","volume":"241 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Simulating non-stationary congestion systems using splitting with applications to cyber security\",\"authors\":\"M. J. Fischer, D. Masi, J. Shortle, Chun-Hung Chen\",\"doi\":\"10.1109/WSC.2010.5678981\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"According to the former counterterrorism czar, Richard A. Clarke (2010), our national infrastructure could be severely damaged in 15 minutes by a cyber attack. A worm attack on an Internet Protocol (IP) network is one type of attack that is possible. Such an attack would result in a non-stationary arrival process of packets on a link in the network. In this paper we present an initial use of our Optimal Splitting Technique for Rare Events (OSTRE) to simulate the congestion imposed by the worm on the link. This initial application is oriented to testing the technique in this dynamic environment and report on its use as compared with conventional simulations.\",\"PeriodicalId\":272260,\"journal\":{\"name\":\"Proceedings of the 2010 Winter Simulation Conference\",\"volume\":\"241 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2010 Winter Simulation Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WSC.2010.5678981\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2010 Winter Simulation Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WSC.2010.5678981","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
摘要
根据前反恐沙皇Richard a . Clarke(2010)的说法,我们的国家基础设施可能在15分钟内被网络攻击严重破坏。在互联网协议(IP)网络上的蠕虫攻击是一种可能的攻击。这种攻击会导致网络中某条链路上的数据包到达过程不稳定。在本文中,我们提出了我们的罕见事件最优分割技术(OSTRE)的初步使用,以模拟蠕虫对链路施加的拥塞。这个最初的应用程序是为了在这个动态环境中测试该技术,并报告其与传统模拟的使用情况。
Simulating non-stationary congestion systems using splitting with applications to cyber security
According to the former counterterrorism czar, Richard A. Clarke (2010), our national infrastructure could be severely damaged in 15 minutes by a cyber attack. A worm attack on an Internet Protocol (IP) network is one type of attack that is possible. Such an attack would result in a non-stationary arrival process of packets on a link in the network. In this paper we present an initial use of our Optimal Splitting Technique for Rare Events (OSTRE) to simulate the congestion imposed by the worm on the link. This initial application is oriented to testing the technique in this dynamic environment and report on its use as compared with conventional simulations.