首页> 外文会议>International Conference on Applied Human Factors and Ergonomics >Two Complementary Network Modeling and Simulation Approaches to Aid in Understanding Advanced Cyber Threats
【24h】

Two Complementary Network Modeling and Simulation Approaches to Aid in Understanding Advanced Cyber Threats

机译:两个互补网络建模和模拟方法,以帮助了解高级网络威胁

获取原文

摘要

This paper describes two complementary approaches to modeling and simulation (M&S) of sophisticated malware attacks for their use in understanding and preparing for potential threats. Modern malware operates at multiple scales, and successfully defending against these attacks requires the ability to understand the effects of decisions across this range. We present two types of M&S frameworks that differ in fidelity and scalability. The first is a low fidelity, scalable approach for representing and studying the spread of malware in a large network at a macro scale. The network is both modelled and simulated in ns-3, a discrete event simulation tool typically used for protocol exploration and traffic monitoring that supports the simulation of tens of thousands of nodes. The second type of simulation is a higher-fidelity, micro scale approach that includes nodes that closely emulate the behavior of actual computer systems and may include real hardware and software. Ns-3 allows outside networks to interact in real-time with ns-3. This enables the combination of the network simulation environment with real and virtual machines to allow detailed observation of the ways in which a hypothetical advanced persistent threat would play out in a small subnetwork. The interface between the ns-3 simulation, attack framework (e.g. Metasploit), and the real and virtual nodes is managed by a controller that also supplies configuration, business logic and results logging. We present use cases for both simulation types, showing how each approach can be used in the analysis of malware.
机译:本文介绍了两种互补方法,用于复杂恶意软件攻击的模拟和仿真(M&S),以便在理解和准备潜在威胁中使用。现代恶意软件在多种尺度上运行,并成功地防止这些攻击需要了解在此范围内的决策的影响。我们介绍了两种类型的M&S框架,这些框架在富达和可扩展性方面不同。首先是一种低保真度,可扩展的方法,用于以宏观缩放的大网络中恶意软件的传播。网络均在NS-3中进行建模和模拟,一个离散的事件仿真工具通常用于协议探索和流量监控,支持数万个节点的模拟。第二种类型的模拟是一种更高保真度,微尺度方法,包括细节,该节点能够紧密地模拟实际计算机系统的行为,并且可以包括真实硬件和软件。 NS-3允许外部网络实时与NS-3进行交互。这使得网络仿真环境与实际机器的组合能够结合,以便详细地观察假设的高级持久威胁将在一个小的子网中发挥作用。 NS-3仿真之间的接口,攻击框架(例如Metasploit),以及实验和虚拟节点也由控制器管理,该控制器还提供配置,业务逻辑和结果日志记录。我们为两个模拟类型提供了用例,显示了如何在恶意软件分析中使用各种方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号