Loading…

Simulating network cyber attacks using splitting techniques

As a result of potential damage to our national infrastructure due to cyber attacks, a number of cyber-security bills have been introduced in Congress and a National Strategy for Trusted Identities in Cyber-space has been developed by the White House; a component of this strategy is the development...

Full description

Saved in:
Bibliographic Details
Main Authors: Masi, D. M. B., Fischer, M. J., Shortle, J. F., Chen, C.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:As a result of potential damage to our national infrastructure due to cyber attacks, a number of cyber-security bills have been introduced in Congress and a National Strategy for Trusted Identities in Cyber-space has been developed by the White House; a component of this strategy is the development of models to assess risks due to cyber incidents. A worm attack on a network is one type of attack that is possible. The simulation of rare events, such as the occurrence of a catastrophic worm attack, is impractical without special simulation techniques. In this paper we present an application of splitting methods to estimate rare-event probabilities associated with the propagation of a worm through a network. We explore the sensitivity of the benefits of splitting methods, as compared to standard simulation, to the rarity of the event and the level function used.
ISSN:0891-7736
1558-4305
DOI:10.1109/WSC.2011.6148019