An experimental investigation of malware attacks on SCADA systems

IN Fovino, A Carcano, M Masera… - International Journal of …, 2009 - Elsevier
Modern critical infrastructures are continually exposed to new threats due to the
vulnerabilities and architectural weaknesses introduced by the extensive use of information …

Bandwidth distributed denial of service: Attacks and defenses

M Geva, A Herzberg, Y Gev - IEEE Security & Privacy, 2013 - ieeexplore.ieee.org
The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks,
wherein many hosts send a huge number of packets to cause congestion and disrupt …

Simulating cyber-attacks for fun and profit

A Futoransky, F Miranda, J Orlicki… - arxiv preprint arxiv …, 2010 - arxiv.org
We introduce a new simulation platform called Insight, created to design and simulate cyber-
attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and …

Интеллектуальные сервисы защиты информации в критических инфраструктурах

ИВ Котенко, ИБ Саенко, ЕВ Дойникова, ЕС Новикова… - 2019 - elibrary.ru
В монографии рассмотрены ключевые вопросы, связанные с построением и
функционированием интеллектуальных сервисов защиты информации в критических …

Simulating malware with MAlSim

R Leszczyna, I Nai Fovino, M Masera - Journal in computer virology, 2010 - Springer
Abstract This paper describes MAlSim—Mobile Agent Malware Simulator—a mobile agent
framework developed to address one of the most important problems related to the …

Agent‐based modeling of malware dynamics in heterogeneous environments

A Bose, KG Shin - Security and Communication Networks, 2013 - Wiley Online Library
The increasing convergence of power‐law networks such as social networking and peer‐to‐
peer applications, web‐delivered applications, and mobile platforms makes today's users …

Application-level simulation for network security

S Schmidt, R Bye, J Chinnow, K Bsufka… - …, 2010 - journals.sagepub.com
NeSSi (network security simulator) is a novel network simulation tool which incorporates a
variety of features relevant to network security distinguishing it from general-purpose …

Application-level simulation for network security

R Bye, S Schmidt, K Luther, S Albayrak - 1st International ICST Conference …, 2010 - eudl.eu
We introduce and describe a novel network simulation tool called NeSSi (Network Security
Simulator). NeSSi incorporates a variety of features relevant to network security …

Propagation, detection and containment of mobile malware

A Bose - 2008 - search.proquest.com
Today's enterprise systems and networks are frequent targets of malicious attacks, such as
worms, viruses, spyware and intrusions that can disrupt, or even disable critical services …

A decision support system for placement of intrusion detection and prevention devices in large-scale networks

R Puzis, M Tubi, Y Elovici, C Glezer… - ACM Transactions on …, 2011 - dl.acm.org
This article describes an innovative Decision Support System (DSS) for Placement of
Intrusion Detection and Prevention Systems (PIDPS) in large-scale communication …