ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Design of Attack Generation Test-suite based Scenario for Security Solutions Testing
Cited - time in scopus Share share facebook twitter linkedin kakaostory
Authors
Hwan Kuk Kim, Yang Seo Choi, Dong Il Seo
Issue Date
2005-02
Citation
International Conference on Advanced Communication Technology (ICACT) 2005, pp.676-679
Publisher
IEEE
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1109/ICACT.2005.245959
Abstract
Currently, Internet is deeply rooted in everyday life and many things are performed using Internet in real world. Internet users increased because of convenience. But then, Internet accident is on the increase rapidly. Recently, large scale network attack infestations, as seen last year in the cases Code Red, Nimda, are a cause great concern for the computer security communication. These network worm attack becomes the biggest threat that could be the down utility of network availability. Therefore, it needs high efficiency information protection system development. And the security companies have developed numerous security reinforcement systems to protect systems and networks from various intrusions. A traditional performing test tools are not adequate for testing and benchmarking of security solutions against exploits (attacks on a network), Trojans (viruses), DoS attacks, and other intrusions. Also, there are many individual test suites to evaluate security solutions. However, automating testing eliminates the effects of individual differences. Therefore, it is necessary that test suites generate automatically various attack patterns, and traffics based scenario on purpose to analyze the functional stability and performance of security solution. In this paper, we describe a method of design and implementation about AGT (attack generation test suite) simulator based scenario, which generate various attack patterns using multiple agents
KSP Keywords
Attack generation, DoS Attacks, Functional stability, Large-scale network, Multiple Agents, Network Attacks, Network availability, Real-world, Security communication, Security solutions, Stability and performance