3Optical communnication Group- Communication Technology Department-ITRC
Abstract— recent developments in the fields of networking and cyberspace have greatly benefited mankind, but the rapid growth of cyberspace has also contributed to unethical practices by individuals who are bent on using the technology to exploit others. Such exploitation of cyberspace for the purpose of accessing unauthorized or secure information, spying, disabling of networks and stealing both data and money is termed as cyber attack . To ensure the capability of systems against cyber attacks, we should evaluate them from view point of security . Security evaluation is done by a system which enables to generate attack, send it to the goal system, and receive the feedback. This system is called Security Evaluation System (SES). In this paper we will propose a new architecture for SES. Our proposed architecture for SES includes some subsystems which are in connection with each other in order to generate and send traffics to the goal system and analyses it from performance and security point of view.
Security Evaluation, Data Base, Attack Manager, Traffic Generator, System Manager, vulnerability