Multifacetted modelling and discrete event simulation
Multifacetted modelling and discrete event simulation
Object-oriented simulation with hierarchical, modular models: intelligent agents and endomorphic systems
The IPUS blackboard architecture as a framework for computational auditory scene analysis
Computational auditory scene analysis
Intrusion detection
Intrusion Detection
Theory of Modelling and Simulation
Theory of Modelling and Simulation
Network Intrusion Detection: An Analyst's Handbook
Network Intrusion Detection: An Analyst's Handbook
Hacking Exposed; Network Security Secrets and Solutions
Hacking Exposed; Network Security Secrets and Solutions
How to Systematically Classify Computer Security Intrusions
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Studying the performance of a firewall in network courses
Journal of Computing Sciences in Colleges
Understanding distributed denial of service with object oriented simulation
Proceedings of the 47th Annual Southeast Regional Conference
Simulation model development in information security education
2009 Information Security Curriculum Development Conference
Hi-index | 0.00 |
IDS (Intrusion Detection System) plays a vital role in network security in that it monitors system activities to identity unauthorized use, misuse or abuse of computer and network system. For the simulation of IDS a model has been constructed based on the DEVS (Discrete EVent system Specification) formalism. With this model we can simulate whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. Each agent cooperates through the BBA (Black Board Architecture) for detecting intrusions. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.