An experimental investigation of malware attacks on SCADA systems
Modern critical infrastructures are continually exposed to new threats due to the
vulnerabilities and architectural weaknesses introduced by the extensive use of information …
vulnerabilities and architectural weaknesses introduced by the extensive use of information …
Bandwidth distributed denial of service: Attacks and defenses
M Geva, A Herzberg, Y Gev - IEEE Security & Privacy, 2013 - ieeexplore.ieee.org
The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks,
wherein many hosts send a huge number of packets to cause congestion and disrupt …
wherein many hosts send a huge number of packets to cause congestion and disrupt …
Simulating cyber-attacks for fun and profit
A Futoransky, F Miranda, J Orlicki… - arxiv preprint arxiv …, 2010 - arxiv.org
We introduce a new simulation platform called Insight, created to design and simulate cyber-
attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and …
attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and …
Интеллектуальные сервисы защиты информации в критических инфраструктурах
ИВ Котенко, ИБ Саенко, ЕВ Дойникова, ЕС Новикова… - 2019 - elibrary.ru
В монографии рассмотрены ключевые вопросы, связанные с построением и
функционированием интеллектуальных сервисов защиты информации в критических …
функционированием интеллектуальных сервисов защиты информации в критических …
Simulating malware with MAlSim
Abstract This paper describes MAlSim—Mobile Agent Malware Simulator—a mobile agent
framework developed to address one of the most important problems related to the …
framework developed to address one of the most important problems related to the …
Agent‐based modeling of malware dynamics in heterogeneous environments
The increasing convergence of power‐law networks such as social networking and peer‐to‐
peer applications, web‐delivered applications, and mobile platforms makes today's users …
peer applications, web‐delivered applications, and mobile platforms makes today's users …
Application-level simulation for network security
NeSSi (network security simulator) is a novel network simulation tool which incorporates a
variety of features relevant to network security distinguishing it from general-purpose …
variety of features relevant to network security distinguishing it from general-purpose …
Application-level simulation for network security
We introduce and describe a novel network simulation tool called NeSSi (Network Security
Simulator). NeSSi incorporates a variety of features relevant to network security …
Simulator). NeSSi incorporates a variety of features relevant to network security …
Propagation, detection and containment of mobile malware
A Bose - 2008 - search.proquest.com
Today's enterprise systems and networks are frequent targets of malicious attacks, such as
worms, viruses, spyware and intrusions that can disrupt, or even disable critical services …
worms, viruses, spyware and intrusions that can disrupt, or even disable critical services …
A decision support system for placement of intrusion detection and prevention devices in large-scale networks
This article describes an innovative Decision Support System (DSS) for Placement of
Intrusion Detection and Prevention Systems (PIDPS) in large-scale communication …
Intrusion Detection and Prevention Systems (PIDPS) in large-scale communication …