Abstract
The role played by modeling and simulation in security evaluation is discussed. The useful way to use simulation is to assess proposed security measures costs and limitations with respect to given application as security measures affect system performance. Another use of simulation integrates physical devices, such as routers, computer hosts, and network sensors, with simulated environments. Simulated traffic generation is necessary for studying Internet-scale phenomenon such as worms in which growth characteristics are important. Simulation can also help in identifying new vulnerabilities.
Original language | English (US) |
---|---|
Pages (from-to) | 71-74 |
Number of pages | 4 |
Journal | IEEE Security and Privacy |
Volume | 3 |
Issue number | 5 |
DOIs | |
State | Published - Sep 2005 |
ASJC Scopus subject areas
- Computer Networks and Communications
- Electrical and Electronic Engineering
- Law