Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks

被引:2
|
作者
Kotenko, Igor [1 ]
Shorov, Andrey [1 ]
Novikova, Evgenia [1 ]
机构
[1] Russian Acad Sci SPIIRAS, St Petersburg Inst Informat & Automat, Lab Comp Secur Problems, St Petersburg, Russia
关键词
computer network protection; simulation; bio-inspired approaches; infrastructure attacks; DDoS-attacks; network worms;
D O I
10.1109/PDP.2013.85
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper is devoted to the analysis of the network protection mechanism "nervous network system" based on the bio-inspired metaphor. Packet-level simulation is proposed in order to investigate the "nervous network system" protection mechanism. We describe the architecture of the protection system based on the given mechanism, its operation algorithms and present results of the experiments. Using obtained results the efficiency of the protection mechanism "nervous network system" against infrastructure attacks is analyzed.
引用
收藏
页码:526 / 533
页数:8
相关论文
共 50 条
  • [1] The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks
    Shorov, Andrey
    Kotenko, Igor
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [2] Simulation of Bio-inspired Security Mechanisms against Network Infrastructure Attacks
    Kotenko, Igor
    Shorov, Andrey
    INTELLIGENT DISTRIBUTED COMPUTING VIII, 2015, 570 : 127 - 133
  • [3] Simulation of DDoS-attacks and Protection Mechanisms Against Them
    Bekeneva, Ya.
    Shipilov, N.
    Borisenko, K.
    Shorov, A.
    PROCEEDINGS OF THE 2015 IEEE NORTH WEST RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2015 ELCONRUSNW), 2015, : 49 - 55
  • [4] Investigation of Protection Mechanisms Against DRDoS Attacks Using a Simulation Approach
    Bekeneva, Yana
    Shipilov, Nikolay
    Shorov, Andrey
    INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2016/USMART 2016, 2016, 9870 : 316 - 325
  • [5] Protection mechanisms against phishing attacks
    Plössl, K
    Federrath, H
    Nowey, T
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, 2005, 3592 : 20 - 29
  • [6] Water infrastructure protection against intentional attacks: An experience in Italy
    Cristiana Di Cristo
    Angelo Leopardi
    Giovanni de Marinis
    Frontiers of Earth Science, 2011, 5 : 390 - 399
  • [7] Water infrastructure protection against intentional attacks: An experience in Italy
    Di Cristo, Cristiana
    Leopardi, Angelo
    de Marinis, Giovanni
    FRONTIERS OF EARTH SCIENCE, 2011, 5 (04) : 390 - 399
  • [8] Network Protection Against Node Attacks Based on Probabilistic Availability Measures
    Pioro, Michal
    Mycek, Mariusz
    Tomaszewski, Artur
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (03): : 2742 - 2763
  • [9] Anomaly-based protection approach against wireless network attacks
    Fayssal, Samer
    Hariri, Salim
    2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 193 - 195
  • [10] Web Proxy based Detection and Protection Mechanisms against Client Based HTTP Attacks
    Pandiaraja, P.
    Manikandan, J.
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,