Simulating cyber-intrusion using ordered UML model-based scenarios

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simulation aims at estimation of a small-size network or performance analysis of information protection systems. However, a systematic way to develop network security simulation is needed. In this paper, an ordered UML-based scenario model and its network security simulator are proposed. A network security scenario is presented as a case study of our proposed simulation model. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Park, E. K., Yun, J. B., & In, H. P. (2005). Simulating cyber-intrusion using ordered UML model-based scenarios. In Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) (Vol. 3398, pp. 643–651). Springer Verlag. https://doi.org/10.1007/978-3-540-30585-9_72

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free