Security

Simulating Network Cyber Attacks Using Splitting Techniques

Download Now Free registration required

Executive Summary

As a result of potential damage to the national infrastructure due to cyber attacks, a number of cyber-security bills have been introduced in Congress and a National Strategy for Trusted Identities in Cyber-space has been developed by the White House; a component of this strategy is the development of models to assess risks due to cyber incidents. A worm attack on a network is one type of attack that is possible. The simulation of rare events, such as the occurrence of a catastrophic worm attack, is impractical without special simulation techniques.

  • Format: PDF
  • Size: 360.41 KB