Object-oriented simulation with hierarchical, modular models: intelligent agents and endomorphic systems
The IPUS blackboard architecture as a framework for computational auditory scene analysis
Computational auditory scene analysis
Building Internet firewalls (2nd ed.)
Building Internet firewalls (2nd ed.)
Intrusion detection
Intrusion Detection
Theory of Modelling and Simulation
Theory of Modelling and Simulation
TCP/IP Protocol Suite
Hacking Exposed; Network Security Secrets and Solutions
Hacking Exposed; Network Security Secrets and Solutions
Policy-Based Access Control Framework for Large Networks
ICON '00 Proceedings of the 8th IEEE International Conference on Networks
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Modeling and simulation of distributed security models
ICCS'03 Proceedings of the 2003 international conference on Computational science
Hi-index | 0.01 |
The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of any one system to deal with the intrusions. This paper shows a modeling and simulation of network security in which the multiple IDSes (Intrusion Detection System) and a firewall coordinate by sharing attacker's information for the effective detection of the intrusion. Another characteristic in the proposed simulation is the composition of a real intrusion by generating nonabstracted intrusion packets and, accordingly, the construction of nonabstracted version of IDS and firewall model components.