SEA++: A Framework for Evaluating the Impact of Security Attacks in OMNeT++/INET
This chapter presents SEA++ , a simulation framework that extends OMNeT++ and the INET Framework for evaluating the impact of security attacks on networks and applications in a flexible and user-friendly way. To this end, SEA++ relies on two fundamental b
- PDF / 706,928 Bytes
- 26 Pages / 439.36 x 666.15 pts Page_size
- 12 Downloads / 190 Views
SEA++: A Framework for Evaluating the Impact of Security Attacks in OMNeT++/INET Marco Tiloca, Gianluca Dini, Francesco Racciatti, and Alexandra Stagkopoulou
7.1 Introduction Computer networks are a fundamental component for a wide range of systems and applications, including sensor networks, smart environments, and critical infrastructures. These networked (systems of) systems are also exposed to several cyber and physical security attacks against their infrastructure and the communication between their components. Conducting a risk assessment process is therefore vital to identify potential threats and risks against the system, and to provide indications on how to mitigate them to an acceptable level already at design time. However, it is not viable to fully address all possible attacks to the maximum possible extent, i.e., achieving “perfect” security, due to technical, performance, and economical reasons. Therefore, it is especially important to clearly identify the attacks with the most severe effects on the system and network infrastructure. In particular, it is important to have a clear understanding on the expected effects of successful attacks, in order to rank them based on their severity and then accordingly prioritize security countermeasures to adopt. One approach to achieve this goal is the use of software simulation tools such as OMNeT++/INET. This is particularly convenient as it avoids the impractical alternative of conducting security experiments on real (large scale) systems, possibly already operating. In addition, simulative analysis does not require the deployment
M. Tiloca () · A. Stagkopoulou Security Lab – RISE SICS, Kista, Sweden e-mail: [email protected] G. Dini · F. Racciatti Department of Information Engineering, University of Pisa, Pisa, Italy e-mail: [email protected] © Springer Nature Switzerland AG 2019 A. Virdis, M. Kirsche (eds.), Recent Advances in Network Simulation, EAI/Springer Innovations in Communication and Computing, https://doi.org/10.1007/978-3-030-12842-5_7
253
254
M. Tiloca et al.
of a real networked system at all, thus enabling a thorough assessment of attack effects already at the design phase. Furthermore, simulation is much more feasible to use for studying large-scale and real systems, with respect to alternative approaches based on analytical models or testbeds. But when it comes to evaluating security attacks in networked systems, available simulation tools are often limited and inflexible. That is, the user is typically provided with a limited set of pre-defined attacks to mount against the network scenario, or instead one has to actually implement the desired attack execution and the adversary behavior as additional/extended modules in the simulation tool. This evidently undermines usability as well as flexibility and requires to rebuild the simulation tool in order to evaluate different attacks or even just different attack configurations. This chapter presents SEA++, a simulation framework based on OMNeT++/ INET that quantitatively evaluates th
Data Loading...