Rare Event Simulation: a modified RESTART-Method using the LRE-Algorithm

Author(s):  
Friedrich Schreiber ◽  
Carmelita Görg
2012 ◽  
Vol 44 (5) ◽  
pp. 352-367 ◽  
Author(s):  
John F. Shortle ◽  
Chun-Hung Chen ◽  
Ben Crain ◽  
Alexander Brodsky ◽  
Daniel Brod

Author(s):  
Daniël Reijsbergen ◽  
Pieter-Tjerk de Boer ◽  
Werner Scheinhardt ◽  
Boudewijn Haverkort

Biometrics ◽  
2006 ◽  
Vol 62 (2) ◽  
pp. 632-633 ◽  
Author(s):  
Peter J. Smith

Author(s):  
Alexander L Krall ◽  
Michael E Kuhl ◽  
Shanchieh J Yang

Inherent vulnerabilities in a cyber network’s constituent machine services can be exploited by malicious agents. As a result, the machines on any network are at risk. Security specialists seek to mitigate the risk of intrusion events through network reconfiguration and defense. When dealing with rare cyber events, high-quality risk estimates using standard simulation approaches may be unattainable, or have significant attached uncertainty, even with a large computational simulation budget. To address this issue, an efficient rare event simulation modeling and analysis technique, namely, importance sampling for cyber networks, is developed. The importance sampling method parametrically amplifies certain aspects of the network in order to cause a rare event to happen more frequently. Output collected under these amplified conditions is then scaled back into the context of the original network to provide meaningful statistical inferences. The importance sampling methodology is tailored to cyber network attacks and takes the attacker’s successes and failures as well as the attacker’s targeting choices into account. The methodology is shown to produce estimates of higher quality than standard simulation with greater computational efficiency.


Sign in / Sign up

Export Citation Format

Share Document