International Journal of Wireless and Microwave Technologies(IJWMT)
ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)
Published By: MECS Press
IJWMT Vol.1, No.3, Jun. 2011
A Scalable Simulation Method for Network Attack
Full Text (PDF, 665KB), PP.21-28
In order to found a scalable platform for attack resistance test, this paper proposed a simulation method for network attack. We designed a modular framework and using XML to describe the test cases. We also realized both stateful and stateless attacks by Socket programming and Jpcap packet forging method. Experiment results showed that the system has good scalability and provides a template-based testing circuit.
Cite This Paper
Jinsong Wang,Wenchao Dou,Kai Shi,"A Scalable Simulation Method for Network Attack", IJWMT, vol.1, no.3, pp.21-28, 2011.
US-CERT Vulnerability Notes. http://www.cert.org/.
L. Gordon, P. Loeb, W. Lucyshyn and R. Richardson. 2005 CSI/FBI Computer Crime and Security Survey. Computer Security Institute. 2005.
Secunia Advisory. Cisco IOS Multiple Vulnerabilities. (2009207215). http://secunia.com/advisories/23867.
China Information Security Evaluation Center. China National Vulnerability Database. (2009210218). http://www.cnnvd.org.cn.
SUN Chang-hua, LIU Bin, “Survey on New Solutions Against Distributed Denial of Service Attacks”, ACTA ELECTRONICA SINICA, 2009, 37(7) (in Chinese).
GUO Er-wang, XIA Nai, “A Generic Testbed for Security Enhancement Tools”, Computer Engineering and Applications, 2006.30(in Chinese).
ZHANG Bao-feng, ZHANG Chong-bin, XU Yuan, “Network protocol vulnerability discovery based on fuzzy testing”, J Tsinghua Univ (Sci & Tech), 2009, 49(S2) (in Chinese).
Keita Fujii. Jpcap a Java library for capturing and sending network packets.[2007-10-19]. http://netresearch.ics.uci.edu/kfujii/jpcap/doc/.