SYSTEM INTRUSION PROCESSES - A SIMULATION-MODEL

Authors
Citation
Bc. Soh et Ts. Dillon, SYSTEM INTRUSION PROCESSES - A SIMULATION-MODEL, Computers & security, 16(1), 1997, pp. 71-79
Citations number
9
Categorie Soggetti
Computer Sciences, Special Topics","Computer Science Information Systems
Journal title
ISSN journal
01674048
Volume
16
Issue
1
Year of publication
1997
Pages
71 - 79
Database
ISI
SICI code
0167-4048(1997)16:1<71:SIP-AS>2.0.ZU;2-D
Abstract
In the past few years several break-ins to computer networks and compu ter systems have occurred, and break-ins are becoming more widespread. They may be the acts of external intruders (outsiders), internal intr uders (insiders) or both. More often than not, these intruders attack the system with malicious intent to affect system security attributes, namely secrecy, integrity and service availability. In our paper [1] (Computers & Security, 1995, 14, 621-631) we use a model to present an analytical study of computer system intrusions. This subsequent paper describes a fixed-increment, time-advance, ciscrete-event simulation study of system intrusion processes. The analytical model is subsequen tly used to validate the simulation study. (C) 1997 Elsevier Science L td.