Object-oriented simulation with hierarchical, modular models: intelligent agents and endomorphic systems
Computer security
Building Internet firewalls (2nd ed.)
Building Internet firewalls (2nd ed.)
Network Intrusion Detection: An Analyst's Handbook
Network Intrusion Detection: An Analyst's Handbook
Hacking Exposed; Network Security Secrets and Solutions
Hacking Exposed; Network Security Secrets and Solutions
Modeling and Simulation for Detecting a Distributed Denial of Service Attack
AI '02 Proceedings of the 15th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Hi-index | 0.00 |
It is quite necessary that an organization's information network should be equipped with a proper security system based on its scale and importance. One of the effective methods is to use the simulation model for deciding which security policy and mechanism is appropriate for the complex network. The need arises for systems to coordinate with one another, to manage diverse attacks across networks. The coordination issue is the essential problem since it is beyond the scope of any one IDS (Intrusion Detection System) to deal with the intrusions. This paper shows a modeling and simulation of network security in which the multi-security agents coordinate by sharing attacker's information for the effective detection of the intrusion.