earticle

논문검색

DNS Spoofing Attack Simulation for Model-Based Security Evaluation

초록

영어

Security of computer systems and networks has become very significant nowadays. Introducing and using a unified framework for modeling and quantitative security evaluation (QSE) is an open problem. Th results of our study on drawbacks of the existing security assessment methodologies motivated us to use a simulation framework for model-based security evaluation. We have used discrete-event simulation (DES) and the SimEvents tool for QSE of a domain name system (DNS). First, the normal operation of the DNS is simulated. Then, an attacker is added to the model. The aim is to evaluate the instantaneous availability of DNS as an important measure of security. Finally, as a case study, DNS spoofing attack model is constructed and the availability of the attacked system is evaluated. The proposed approach can
be used for other kinds of attacks and other types of systems, networks and applications. In this paper the simulation models and their results are presented.

목차

Abstract
 1. Introduction
 2. Related Works
 3. A Simulation Model for Evaluation of System Availability
 4. Case Study: Modeling and Evaluation of DNS Spoofing
  4.1 Simulation Model of the Normal Operation
  4.2 Simulation Model of the DNS Spoofing Attack
 5. Conclusions
 References

저자정보

  • Golriz Khazan ICT Group, E-Learning Center, Iran University of Science and Technology, Tehran, Iran
  • Mohammad Abdollahi Azgomi Department of Computer Engineering, Iran University of Science and Technology, Tehran, Iran

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.