• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Design and Implementation of Scenario-based Attack Simulator using NS


Hyang-Chang Choi, Noh Bong-Nam, Lee Hyung-Hyo, Journal of Internet Computing and Services, Vol. 7, No. 5, pp. 59-70, Oct. 2006
Full Text:
Keywords: Scenario Attack, Network Simulator, IDS, DARPA

Abstract

Generally, network attacks are based on a scenario composed of a series of single-attacks, scenario attacks are launched over a wide network environment and their targets are not apparent. it is required to analyze entire packets captured on the network. This method makes it difficult to detect accurate patterns of attacks because it unnecessarily analyzes even packets unrelated to attacks. In this paper, we design and implement a simulation system for attacks scenario, which helps packet classification connected with attacks. The proposed system constitutes a target network for analysis in a virtual simulation environment, and it simulates dumping TCPDUMP packets including scenario attacks under the constructed virtual environment, We believe that our proposed simulation system will be a useful tool when security administrators perform the analysis of patterns of attack scenarios.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Choi, H., Bong-Nam, N., & Hyung-Hyo, L. (2006). Design and Implementation of Scenario-based Attack Simulator using NS. Journal of Internet Computing and Services, 7(5), 59-70.

[IEEE Style]
H. Choi, N. Bong-Nam, L. Hyung-Hyo, "Design and Implementation of Scenario-based Attack Simulator using NS," Journal of Internet Computing and Services, vol. 7, no. 5, pp. 59-70, 2006.

[ACM Style]
Hyang-Chang Choi, Noh Bong-Nam, and Lee Hyung-Hyo. 2006. Design and Implementation of Scenario-based Attack Simulator using NS. Journal of Internet Computing and Services, 7, 5, (2006), 59-70.