Application-level Simulation for Network Security

dc.contributor.authorSchmidt, Stephan
dc.contributor.authorBye, Rainer
dc.contributor.authorChinnow, Joël
dc.contributor.authorBsufka, Karsten
dc.contributor.authorCamtepe, Ahmet
dc.contributor.authorAlbayrak, Sahin
dc.date.accessioned2019-01-08T17:51:49Z
dc.date.available2019-01-08T17:51:49Z
dc.date.issued2010
dc.descriptionDieser Beitrag ist mit Zustimmung des Rechteinhabers aufgrund einer (DFG geförderten) Allianz- bzw. Nationallizenz frei zugänglich.de
dc.descriptionThis publication is with permission of the rights owner freely accessible due to an Alliance licence and a national licence (funded by the DFG, German Research Foundation) respectively.en
dc.description.abstractNeSSi (network security simulator) is a novel network simulation tool which incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Its capabilities such as profile-based automated attack generation, traffic analysis and support for detection algorithm plug-ins allow it to be used for security research and evaluation purposes. NeSSi has been successfully used for testing intrusion detection algorithms, conducting network security analysis and developing overlay security frameworks. NeSSi is built upon the agent framework JIAC, resulting in a distributed and extensible architecture. In this paper, we provide an overview of the NeSSi architecture as well as its distinguishing features and briefly demonstrate its application to current security research projects.en
dc.identifier.eissn1741-3133
dc.identifier.issn0037-5497
dc.identifier.urihttps://depositonce.tu-berlin.de//handle/11303/8939
dc.identifier.urihttp://dx.doi.org/10.14279/depositonce-8068
dc.language.isoen
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.subject.ddc004 Datenverarbeitung; Informatikde
dc.subject.othernetwork simulationen
dc.subject.othernetwork securityen
dc.subject.otherdiscrete-event simulationen
dc.subject.otherpacket-level simulationen
dc.subject.otherapplication-level simulationen
dc.titleApplication-level Simulation for Network Securityen
dc.typeArticleen
dc.type.versionpublishedVersionen
dcterms.bibliographicCitation.doi10.1177/0037549709340730
dcterms.bibliographicCitation.issue5-6
dcterms.bibliographicCitation.journaltitleSimulation : transactions of The Society for Modeling and Simulation Internationalen
dcterms.bibliographicCitation.originalpublishernameSAGE Publicationsen
dcterms.bibliographicCitation.originalpublisherplaceWashington, DCen
dcterms.bibliographicCitation.pageend330
dcterms.bibliographicCitation.pagestart311
dcterms.bibliographicCitation.volume86
tub.accessrights.dnbdomain
tub.affiliationFak. 4 Elektrotechnik und Informatik>Inst. Wirtschaftsinformatik und Quantitative Methoden>FG Agententechnologien in betrieblichen Anwendungen und der Telekommunikation (AOT)de
tub.affiliation.facultyFak. 4 Elektrotechnik und Informatikde
tub.affiliation.groupFG Agententechnologien in betrieblichen Anwendungen und der Telekommunikation (AOT)de
tub.affiliation.instituteInst. Wirtschaftsinformatik und Quantitative Methodende
tub.publisher.universityorinstitutionTechnische Universität Berlinde
Files
Original bundle
Now showing 1 - 1 of 1
Loading…
Thumbnail Image
Name:
Schmidt_et_al_2010.pdf
Size:
1.22 MB
Format:
Adobe Portable Document Format
Description:
Collections