Computer security
Building Internet firewalls (2nd ed.)
Building Internet firewalls (2nd ed.)
Object-Oriented Artificial Intelligence Using C++
Object-Oriented Artificial Intelligence Using C++
Hacking Exposed Windows 2000: Network Security Secrets and Solutions
Hacking Exposed Windows 2000: Network Security Secrets and Solutions
Theory of Modeling and Simulation
Theory of Modeling and Simulation
DEVS Simulation of distributed intrusion detection systems
Transactions of the Society for Computer Simulation International - Recent advances in DEVS Methodology--part I
Fang: A Firewall Analysis Engine
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A knowledge-based simulation environment for hierarchical flexible manufacturing
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Using modelling and simulation for policy decision support in identity management
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Hi-index | 0.00 |
It is quite necessary that an organization's information network should be equipped with a proper security system based on its scale and importance. One of the effective methods is to use the simulation model for deciding which security policy and mechanism is appropriate for the complex network. Our goal is to build a foundation of knowledge-based modeling and simulation environment for the network security. Within this environment, users can construct the simulation model of security mechanisms, apply various security policies, and quantitatively analyze their security performance against possible attacks. In this study, we considered security domain and implemented the models based on a systematic modeling approach. We enabled the model to include knowledge in modular fashion and provided well-defined guidelines for transforming security policy to concrete rule set.