首页> 外文会议>Modeling and simulation for defense systems and applications VI >Advancing botnet modeling techniques for military and security simulations
【24h】

Advancing botnet modeling techniques for military and security simulations

机译:用于军事和安全模拟的先进僵尸网络建模技术

获取原文
获取原文并翻译 | 示例

摘要

Simulation environments serve many purposes, but they are only as good as their content. One of the most challenging and pressing areas that call for improved content is the simulation of bot armies (botnets) and their effects upon networks and computer systems. Botnets are a new type of malware, a type that is more powerful and potentially dangerous than any other type of malware. A botnet's power derives from several capabilities including the following: 1) the botnet's capability to be controlled and directed throughout all phases of its activity, 2) a command and control structure that grows increasingly sophisticated, and 3) the ability of a bot's software to be updated at any time by the owner of the bot (a person commonly called a bot master or bot herder.) Not only is a bot army powerful and agile in its technical capabilities, a bot army can be extremely large, can be comprised of tens of thousands, if not millions, of compromised computers or it can be as small as a few thousand targeted systems. In all botnets, their members can surreptitiously communicate with each other and their command and control centers. In sum, these capabilities allow a bot army to execute attacks that are technically sophisticated, difficult to trace, tactically agile, massive, and coordinated. To improve our understanding of their operation and potential, we believe that it is necessary to develop computer security simulations that accurately portray bot army activities, with the goal of including bot army simulations within military simulation environments. In this paper, we investigate issues that arise when simulating bot armies and propose a combination of the biologically inspired MSEIR infection spread model coupled with the jump-diffusion infection spread model to portray botnet propagation
机译:模拟环境有多种用途,但仅与其内容一样好。要求改进内容的最具挑战性和紧迫性的领域之一是模拟僵尸网络(僵尸网络)及其对网络和计算机系统的影响。僵尸网络是一种新型的恶意软件,它比其他任何类型的恶意软件都功能强大,并且具有潜在的危险性。僵尸网络的能力源于以下几种功能:1)僵尸网络在其活动的所有阶段都受到控制和控制的能力; 2)越来越复杂的命令和控制结构; 3)僵尸软件的能力由僵尸程序拥有者(通常被称为僵尸程序大师或僵尸牧民)随时更新。僵尸程序军队不仅具有强大的技术能力和敏捷性,而且庞大的僵尸程序军队可以包括数以万计,甚至不是数百万计的受感染计算机,也可能只有几千个目标系统。在所有僵尸网络中,它们的成员可以彼此秘密进行通讯,并可以与他们的指挥和控制中心进行秘密通信。总之,这些功能使机械人军能够执行技术上复杂,难以追踪,战术上敏捷,大规模且协调一致的攻击。为了增进我们对它们的运作和潜力的了解,我们认为有必要开发能够准确刻画机器人军队活动的计算机安全仿真,目标是将机器人军队仿真纳入军事仿真环境中。在本文中,我们研究了模拟僵尸军队时出现的问题,并提出了生物学启发的MSEIR感染传播模型与跳跃扩散感染传播模型的组合,以描绘僵尸网络的传播。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号