Modeling and simulation in security evaluation

Research output: Contribution to journalReview article

Abstract

The role played by modeling and simulation in security evaluation is discussed. The useful way to use simulation is to assess proposed security measures costs and limitations with respect to given application as security measures affect system performance. Another use of simulation integrates physical devices, such as routers, computer hosts, and network sensors, with simulated environments. Simulated traffic generation is necessary for studying Internet-scale phenomenon such as worms in which growth characteristics are important. Simulation can also help in identifying new vulnerabilities.

Original languageEnglish (US)
Pages (from-to)71-74
Number of pages4
JournalIEEE Security and Privacy
Volume3
Issue number5
DOIs
StatePublished - Sep 1 2005

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Law

Fingerprint Dive into the research topics of 'Modeling and simulation in security evaluation'. Together they form a unique fingerprint.

  • Cite this