Flood attack projection model
First Claim
Patent Images
1. A method of simulating a flood attack in a communication network comprising:
- providing a communication network comprising;
a plurality of nodes including an active host node and a plurality of further active nodes, said plurality of further active nodes including a target node and a plurality of participating nodes that participate in the flood attack simulation;
a network component that transports packets, installed on each of said plurality of further active nodes;
an attack handler on each of the participating nodes of said plurality of further active nodes; and
an attack master program;
each of said attack handlers generating virtual messages of an attack model projected forward in time, wherein said virtual messages include normal system component models also projected forward in time;
sending said virtual messages to said target node and others of said attack handlers, said participating nodes not including said target node;
injecting said attack handlers onto said participating nodes and sending an initiate simulated attack message to said attack handlers disposed on said active host node;
causing said virtual messages of an attack model to propagate through said communication network, whereby the communication network'"'"'s operation is not disrupted because the virtual messages of an attack model are projected forward in time.
0 Assignments
0 Petitions
Accused Products
Abstract
A flood attack of an information system is simulated by injecting an algorithmically compressed flood attack model into the information system to assess the effect of the attack upon the system. The flood attack model propagates from node to node throughout the system by way of virtual messages that time-project the flood attack model and do not disrupt system operation while the simulated flood attack is taking place. Programs of executable code installed on nodes of the information system generate and send the virtual messages describing the flood attack.
-
Citations
8 Claims
-
1. A method of simulating a flood attack in a communication network comprising:
-
providing a communication network comprising; a plurality of nodes including an active host node and a plurality of further active nodes, said plurality of further active nodes including a target node and a plurality of participating nodes that participate in the flood attack simulation; a network component that transports packets, installed on each of said plurality of further active nodes; an attack handler on each of the participating nodes of said plurality of further active nodes; and an attack master program; each of said attack handlers generating virtual messages of an attack model projected forward in time, wherein said virtual messages include normal system component models also projected forward in time; sending said virtual messages to said target node and others of said attack handlers, said participating nodes not including said target node; injecting said attack handlers onto said participating nodes and sending an initiate simulated attack message to said attack handlers disposed on said active host node; causing said virtual messages of an attack model to propagate through said communication network, whereby the communication network'"'"'s operation is not disrupted because the virtual messages of an attack model are projected forward in time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification