In the past few years several break-ins to computer networks and compu
ter systems have occurred, and break-ins are becoming more widespread.
They may be the acts of external intruders (outsiders), internal intr
uders (insiders) or both. More often than not, these intruders attack
the system with malicious intent to affect system security attributes,
namely secrecy, integrity and service availability. In our paper [1]
(Computers & Security, 1995, 14, 621-631) we use a model to present an
analytical study of computer system intrusions. This subsequent paper
describes a fixed-increment, time-advance, ciscrete-event simulation
study of system intrusion processes. The analytical model is subsequen
tly used to validate the simulation study. (C) 1997 Elsevier Science L
td.