A solution to reduce the traffic load of cyber attacks in security and defense systems using interactive distributed


  1. C. M. Macal and M. J. North, “Tutorial on agent-based modeling and simulation,” in Proceedings of the 37th conference on Winter simulation, pp. 2-15, 2005.
  2. C. M. Macal and M. J. North, “Agent-based modeling and simulation,” in Winter simulation conference, pp. 86-98, 2009.
  3. J. Mirkovic and P. Reiher, “A taxonomy of DDoS attack and DDoS defense mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, pp. 39-53, 2004.
  4. S. Kumar, “Smurf-based distributed denial of service (ddos) attack amplification in internet,” in Internet Monitoring and Protection. ICIMP. Second International Conference on, pp. 25-25, 2007.
  5. I. Kotenko and A. Ulanov, “Simulation of internet DDoS attacks and defense,” in International Conference on Information Security, pp. 327-342, 2006.
  6. I. Kotenko, A. Konovalov, and A. Shorov, “Simulation of Botnets: Agent-based approach,” in Intelligent Distributed Computing IV, pp. 247-255, Springer, 2010.
  7. P. R. Norvig and S. A. Intelligence, “A modern approach,” Prentice Hall, 2002.
  8. F. Sajjad, “Denial of Service–The Smurf Attack,” School of Computer Science University of Windsor, vol. 401, 2009.
  9. W. L. Martinez and A. R. Martinez, “Computational statistics handbook with MATLAB,” vol. 22: CRC press, 2007.
  10. U. N. Bhat, “An introduction to queueing theory: modeling and analysis in applications,” Birkhäuser, 2015.
  11. T. Salimi and M. Dehghani, “Botnet and Its Attacks,” Passive defense quarterly, vol. 4, no. 2, Summer 2014. (in persian)
  12. A. Khajejoei, H. R. Oskoei, and S. R. Chogan, “Study the impacts of INVITE flooding attack in VOIP and offering a new approach to detect attack,” Electronics indostries quarterly, vol. 6, no. 2, 2015. (in persian)
  13. M. Saleh Esfehani and M. Aboali, “An IDS for Detection of Active Attacks against Routing inMobile Ad Hoc Networks,” Journal of Passive Defence Science and Technology, Issue 1, vol. 1, 2010. (in persian)
  14. A. Salehpour, “A New Method Against DoS Attacks of EAP Frames in IEEE802.11i,” Majlesi Journal of Electrical Engineering, Issue 4, vol. 8, 2009.
  15. M. H. Ansari, V. Tabatab Vakily, and M. Gohareie, “Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation,” Journal of electronical & cyber defenc, vol. 4, no. 1, 2016. (in persian)
  16. Sh. Jamali and Gh. Shaker, “Defense against SYN Flooding Attacks: A Scheduling Approach,” Journal of Information Systems and Telecommunication, vol. 2, no 1, pp. 55-62, 2014.
  17. K. Govinda and E. Sathiyamoorthy, “Secure Traffic Management in Cluster Environment to Handle DDOS Attack,” World Applied Sciences Journal, vol. 32, Issue 9, pp. 1828-1834, 2014.
  18. Y. Guo, C. W. Ten, S. Hu, and W. W. Weaver, “Modeling distributed denial of service attack in advanced metering infrastructure,” Innovative Smart Grid Technologies Conference (ISGT), 2015 IEEE Power & Energy Society, 2015.
  19. Q. Huang, H. Kobayashi, and B. Liu, “Modeling of distributed denial of service attacks in wireless networks,” PACRIM. 2003 IEEE Pacific Rim Conference on, 2003.
  20. M. Fathian, M. Abdollahi Azgomi, and H. Dehghani, “Modeling Browsing Behavior Analysis for Malicious Robot Detection in Distributed Denial of Service Attacks, Journal Of Electronical & Cyber Defense,” vol. 4, no. 2, 2016. (In Persian)
  21. B. W. Priest, E. Vuksani, N. Wagner, and et al., “Agent-based simulation in support of moving target cyber defense technology development and evaluation,” Proceeding CNS '15 Proceedings of the 18th Symposium on Communications & Networking, San Diego, CA, USA, pp. 16-23, 2015.
  22. E. Cayirci and R. Ghergherehchi, “Modeling cyber attacks and their effects on decision process,” Proceeding WSC '11 Proceedings of the Winter Simulation Conference, pp. 2632-2641, 2011.
  23. N. Wagner, R. Lippmann, M. Winterrose, and et al., “Agent-based simulation for assessing network security risk due to unauthorized hardware,” Proceeding ADS '15 Proceedings of the Symposium on Agent-Directed Simulation, Society for Computer Simulation International San Diego, CA, USA, pp. 18-26, 2015.
  24. V. Kothari, J. Blythe, S. Smith, and R. Koppel, “Agent-based modeling of user circumvention of security,” Proceeding ACySE '14 Proceedings of the 1st International Workshop on Agents and Cyber Security, no. 5, ACM New York, NY, USA, 2014.
  25. A. Asgharpoor masuleh and A. Sadeghi, “Agent-based modeling of trust in the different structures of social networks,” Iranian Journal of Sociology, vol. 15, no. 2, 2014. (In Persian)
  26. J. Behnamian, “Agent-based approach for cooperative scheduling,” Journal of Industrial and Systems Engineering, vol. 9, Issue 4, 2016.
  27. H. Vakili fard, M. Khoshnood, H. Foroughnejad, and M. Osoolian, “Agent-based modeling in financial markets,” Journal of Knowledge and investment, vol. 3, 2014. (In Persian)
  28. R. M. Crowder, M. A. Robinson, H. P. N. Hughes, and Y. W. Sim, “The Development of an Agent-Based Modeling Framework for Simulating Engineering Team Work,” IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, vol. 42, Issue: 6, pp. 1425-1439, 2012.
  29. M. D. Rossetti, “Simulation modeling and Arena,” John Wiley & Sons, 2015.
Volume 8, Issue 4 - Serial Number 4
January 2020
Pages 79-93
  • Receive Date: 17 April 2017
  • Revise Date: 22 October 2023
  • Accept Date: 19 September 2018
  • Publish Date: 21 January 2018