首页> 外文会议>SPIE Conference on Modeling and Simulation for Defense Systems and Applications >Integrating Botnet Simulations With Network Centric Warfare Simulations
【24h】

Integrating Botnet Simulations With Network Centric Warfare Simulations

机译:将僵尸网络仿真与网络为中心的战争模拟集成

获取原文

摘要

"Botnets," or "bot armies," are large groups of remotely controlled malicious software designed and operated in order to conduct attacks against government and civilian targets. Bot armies are one of the most serious security threats to networks and computer systems in operation today. Botnets are remotely operated by botmasters who can launch large-scale malicious network activity. While bot army activity has, to date, been largely limited to fraud, blackmail, and other criminal activity, their potential for causing large-scale damage to the entire internet and launching large-scale, coordinated attacks on government computers, networks, and data gathering operations has been underestimated. This paper will not discuss how to build bots but instead discuss ways to use simulation to address the threats they pose. This paper suggests means for addressing the need to provide botnet defense training based upon existing simulation environments and discusses the capabilities needed for training systems for botnet activities. In this paper we discuss botnet technologies and review the capabilities that underlie this threat to network, information, and computer security. The second section of the paper contains background information about bot armies and their foundational technologies. The third section contains a discussion of the techniques we developed for estimating botnet bandwidth consumption and our approach for simulating botnet activities. The fourth section contains a summary and suggestions for additional research.
机译:“Botnets”或“Bot军队”是大型群遥控恶意软件,设计和操作,以便对政府和民用目标进行攻击。 BOT军队是今天运营中的网络和计算机系统最严重的安全威胁之一。 BOTNETS由可以推出大规模恶意网络活动的BotMasters远程运营。迄今为止,迄今为止,迄今为止,迄今为止,又一基于欺诈,勒索和其他犯罪活动,他们对整个互联网造成大规模伤害的潜力,并在政府计算机,网络和数据上发射大规模协调攻击收集业务被低估了。本文不会讨论如何构建机器人,而是讨论使用模拟以解决他们姿势的威胁的方法。本文建议解决基于现有仿真环境提供僵尸网络防御培训的需要,并讨论植物活动培训系统所需的能力。在本文中,我们讨论僵尸网络技术,并查看对网络,信息和计算机安全性威胁的功能。本文的第二部分包含有关BOT军队及其基础技术的背景信息。第三部分包含我们开发用于估算僵尸网络带宽消耗的技术以及我们模拟僵尸网络活动的方法的技术。第四部分包含额外研究的摘要和建议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号