Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 172583, 11 pages
http://dx.doi.org/10.1155/2014/172583
Research Article

The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks

1Department of Computer Science and Engineering, Saint-Petersburg Electrotechnical University “LETI”, Professora Popova Street 5, Saint-Petersburg, Russia
2Laboratory of Computer Security Problems, St. Petersburg Institute for Informatics and Automation, 14th Line 39, Saint-Petersburg, Russia
3St. Petersburg National Research University of Information Technologies, Mechanics and Optics, Kronverkskiy Prospekt 49, Saint-Petersburg, Russia

Received 27 June 2014; Accepted 24 July 2014; Published 31 August 2014

Academic Editor: Jianjun Yang

Copyright © 2014 Andrey Shorov and Igor Kotenko. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. “Worldwide Infrastructure Security Report 2014,” Arbor Networks, 2013, http://www.arbornetworks.com/resources/infrastructure-security-report.
  2. I. Kotenko, A. Shorov, and E. Novikova, “Simulation of protection mechanisms based on “nervous network system” against infrastructure attacks,” in Proceedings of the 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP '13), pp. 526–533, Belfast, UK, March 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Meisel, V. Pappas, and L. Zhang, “A taxonomy of biologically inspired research in computer networking,” Computer Networks, vol. 54, no. 6, pp. 901–916, 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. G. Di Caro and M. Dorigo, “AntNet: Distributed stigmergetic control for communications networks,” Journal of Artificial Intelligence Research, vol. 9, pp. 317–365, 1998. View at Google Scholar · View at Scopus
  5. A. Demers, D. Greene, C. Hauser et al., “Epidemic algorithms for replicated database maintenance,” in Proceedings of the 6th Annual ACM Symposium on Principles of Distributed Computing (PODC '87), pp. 1–12, Vancouver, Canada, 1987.
  6. A. Vahdat and D. Becker, “Epidemic routing for partially-connected Ad Hoc networks,” Tech. Rep. CS-2000-06, Duke University, 2000. View at Google Scholar
  7. S. A. Hofmeyr and S. Forrest, “Architecture for an artificial immune system.,” Evolutionary computation, vol. 8, no. 4, pp. 443–473, 2000. View at Publisher · View at Google Scholar · View at Scopus
  8. F. Dressler, “Bio-inspired mechanisms for efficient and adaptive network security,” in Service Management and Self-Organization in IP-Based Networks, p. 6, 2005. View at Google Scholar
  9. K. Anagnostakis, M. Greenwald, S. Ioannidis, A. Keromytis, and D. Li, “A cooperative immunization system for an untrusting internet,” in Proceedings of the 11th IEEE International Conference on Networks (ICON '03), pp. 403–408, 2003.
  10. Y. Chen and H. Chen, “NeuroNet: an adaptive infrastructure for network security,” International Journal of Information, Intelligence and Knowledge, vol. 1, no. 2, pp. 143–168, 2009. View at Google Scholar
  11. R. Simmonds, R. Bradford, and B. Unger, “Applying parallel discrete event simulation to network emulation,” in Proceedings of the 14th Workshop on Parallel and Distributed Simulation (PADS '00), pp. 15–22, Washington, DC, USA, May 2000. View at Scopus
  12. P. Owezarski and N. Larrieu, “A trace based method for realistic simulation,” in Proceedings of the IEEE International Conference on Communications, pp. 2236–2239, Toulouse, France, June 2004. View at Scopus
  13. A. Wagner, T. Dubendorfer, B. Plattner, and R. Hiestand, “Experiences with worm propagation simulations,” in Proceedings ACM Workshop on Rapid Malcode, pp. 34–41, New York, NY, USA, 2003.
  14. G. F. Riley, M. I. Sharif, and W. Lee, “Simulating internet worms,” in Proceedings of the IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (MASCOTS '04), pp. 268–274, Atlanta, Ga, USA, October 2004. View at Publisher · View at Google Scholar · View at Scopus
  15. A. Suvatne, Improved worm simulator and simulations [M.S. thesis], San José State University, San Jose, Calif, USA, 2010.
  16. J. Krishnaswamy, Wormulator: simulator for rapidly spreading malware [M.S. thesis], San Jose State University, San Jose, Calif, USA, 2009.
  17. M. Schuchard, A. Mohaisen, D. Kune, K. Hopper, Y. Nicholas, and E. Vasserman, “Losing control of the internet: using the data plane to attack the control plane,” in Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10), pp. 726–728, ACM, Chicago, Ill, USA, 2010.
  18. M. Williamson, “Throttling viruses: restricting propagation to defeat malicious mobile code,” in Proceedings of the ACSAC Security Conference, pp. 61–68, 2002.
  19. S. Chen and Y. Tang, “Slowing down internet worms,” in Proceedings of the 24th International Conference on Distributed Computing Systems, pp. 312–319, Tokyo, Japan, March 2004. View at Scopus
  20. T. Gamer and C. Mayer, “Large-scale evaluation of distributed attack detection,” in Proceedings of the 2nd International Workshop on OMNeT++, pp. 1–8, Rome, Italy, 2009.
  21. J. Li, J. Mirkovic, M. Wang, M. Reiher, and L. Zhang, “SAVE: source address validity enforcement protocol,” in Proceednig of the 21st IEEE Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '02), pp. 1557–1566, New York, NY, USA, June 2002. View at Publisher · View at Google Scholar · View at Scopus
  22. Y. Chen, K. Hwang, and W. Ku, “Collaborative detection of DDoS attacks over multiple network domains,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 12, pp. 1649–1662, 2007. View at Publisher · View at Google Scholar · View at Scopus
  23. I. Kotenko, A. Konovalov, and A. Shorov, “Agent-based simulation of cooperative defence against botnets,” Concurrency Computation Practice and Experience, vol. 24, no. 6, pp. 573–588, 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. I. Kotenko, A. Konovalov, and A. Shorov, “Agent-based modeling and simulation of botnets and botnet defense,” in Proceedings of the 2010 Conference on Cyber Conflict, pp. 21–44, CCD COE Publications, Tallinn, Estonia, 2010.
  25. T. Peng, C. Leckie, and K. Ramamohanarao, “Proactively detecting distributed denial of service attacks using source IP address monitoring,” in Networking 2004, vol. 3042 of Lecture Notes in Computer Science, pp. 771–782, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  26. I. Kotenko and A. Shorov, “Simulation of protection mechanisms against botnets on the basis of “nervous network” framework,” in Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH '12), pp. 164–169, SciTePress, July 2012. View at Scopus