Simulating Network Cyber Attacks Using Splitting Techniques

As a result of potential damage to the national infrastructure due to cyber attacks, a number of cyber-security bills have been introduced in Congress and a National Strategy for Trusted Identities in Cyber-space has been developed by the White House; a component of this strategy is the development of models to assess risks due to cyber incidents. A worm attack on a network is one type of attack that is possible. The simulation of rare events, such as the occurrence of a catastrophic worm attack, is impractical without special simulation techniques.

Provided by: Institute of Electrical & Electronic Engineers Topic: Security Date Added: Nov 2011 Format: PDF

Find By Topic