From simulation to emulation - an integrated approach for network security evaluation
نویسندگان
چکیده
We present a virtual test bed for network security evaluation in mid-scale telecommunication networks. Migration from simulation scenarios towards the test bed is supported and enables researchers to evaluate experiments in a more realistic environment. We provide a comprehensive interface to manage, run and evaluate experiments. On basis of a concrete example we show how the proposed test bed can be utilized.
منابع مشابه
A Reliability Approach on Redesigning the Warehouses in Supply Chain with Uncertain Parameters via Integrated Monte Carlo Simulation and Tuned Artificial Neural Network
In this paper, a reliability approach on reconfiguration decisions in a supply chain network is studied based on coupling the simulation concepts and artificial neural network. In other words, due to the limited budget for warehouse relocation in a supply chain, the failure probability is assessed for determining the robust decision for future supply chain configuration. Traditional solving ...
متن کاملEmulation of “single-packet” UDP Scanning Worms in Large Enterprises
Worms are a serious threat to Internet security. The past research on worm has been focused on mathematical modeling, numerical analysis, and simulation in addition to proposed defense strategies. We believe a fine-grained, packet-level emulation of worm propagation in enterprise networks is highly beneficial for the deep understanding of worm dynamics and a prerequisite for worm containment an...
متن کاملAn integrated simulation-DEA approach to multi-criteria ranking of scenarios for execution of operations in a construction project
The purpose of this study is to examine different scenarios for implementing operations in the pre-construction phase of a project, based on several competing criteria with different importance levels in order to achieve a more efficient execution plan. This paper presents a new framework that integrates discrete event simulation (DES) and data envelopment analysis (DEA) to rank different scena...
متن کاملSecurity Research and Learning Environment Based on Scalable Network Emulation
Subject review Security attacks are becoming a standard part of the Internet and their frequency is constantly increasing. Therefore, an efficient way to research and investigate attacks is needed. Studying attacks needs to be coupled with security evaluation of currently deployed systems that are affected by them. The security evaluation and research process needs to be completed quickly to co...
متن کاملStatic Security Constrained Generation Scheduling Using Sensitivity Characteristics of Neural Network
This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....
متن کامل