Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks

被引:2
|
作者
Kotenko, Igor [1 ]
Shorov, Andrey [1 ]
Novikova, Evgenia [1 ]
机构
[1] Russian Acad Sci SPIIRAS, St Petersburg Inst Informat & Automat, Lab Comp Secur Problems, St Petersburg, Russia
关键词
computer network protection; simulation; bio-inspired approaches; infrastructure attacks; DDoS-attacks; network worms;
D O I
10.1109/PDP.2013.85
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper is devoted to the analysis of the network protection mechanism "nervous network system" based on the bio-inspired metaphor. Packet-level simulation is proposed in order to investigate the "nervous network system" protection mechanism. We describe the architecture of the protection system based on the given mechanism, its operation algorithms and present results of the experiments. Using obtained results the efficiency of the protection mechanism "nervous network system" against infrastructure attacks is analyzed.
引用
收藏
页码:526 / 533
页数:8
相关论文
共 50 条
  • [21] Lethality of complex neuronal network in Caenorhabditis elegans nervous system based on cell attacks
    Seongkyun Kim
    Hyoungkyu Kim
    Jaeseung Jeong
    BMC Neuroscience, 13 (Suppl 1)
  • [22] Architecture of the Software System for Adaptive Protection of Network Infrastructure
    Levonevskiy, Dmitriy
    Fedorchenko, Ludmila
    Afanasieva, Irina
    Novikov, Fedor
    11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [23] Preventing Terroristic Attacks Against Cultural Heritage as Part of a Critical Infrastructure Protection Strategy
    Niglia, Alessandro
    Torretta, Letizia
    COUNTERING TERRORISM, PREVENTING RADICALIZATION AND PROTECTING CULTURAL HERITAGE: THE ROLE OF HUMAN FACTORS AND TECHNOLOGY, 2017, 133 : 1 - 16
  • [24] Attacks against computer network: Formal grammar-based framework and simulation tool
    Gorodetski, V
    Kotenko, I
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2002, 2516 : 219 - 238
  • [25] IC Protection Against JTAG-Based Attacks
    Ren, Xuanle
    Torres, Francisco Pimentel
    Blanton, R. D.
    Tavares, Vitor Grade
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2019, 38 (01) : 149 - 162
  • [26] Online monitoring and analysis for self-protection against network attacks
    Qu, GZ
    Hariri, S
    Jangiti, S
    Rudraraju, J
    Oh, S
    Fayssal, S
    Zhang, GS
    Parashar, M
    INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2004, : 324 - 325
  • [27] Novel Mechanism of Network Protection against the New Generation of Cyber Attacks
    Milovanov, Alexander
    Bukshpun, Leonid
    Pradhan, Ranjit
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE XI, 2012, 8359
  • [28] Protection system against overload and distributed Denial of Service attacks
    Toth, Ervin
    Hornak, Zoltan
    Toth, Gergely
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 195 - +
  • [29] Node Copying for Protection Against Graph Neural Network Topology Attacks
    Regol, Florence
    Pal, Soumyasundar
    Coates, Mark
    2019 IEEE 8TH INTERNATIONAL WORKSHOP ON COMPUTATIONAL ADVANCES IN MULTI-SENSOR ADAPTIVE PROCESSING (CAMSAP 2019), 2019, : 709 - 713
  • [30] A Secure Network Coding System Against Wiretap Attacks
    Wang Xuebing
    Qin Na
    Liu Yantao
    2019 34RD YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2019, : 62 - 67