Simulation of network security with collaboration among IDS models

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

IDS (Intrusion Detection System) plays a vital role in network security in that it monitors system activities to identity unauthorized use, misuse or abuse of computer and network system. For the simulation of IDS a model has been constructed based on the DEVS (Discrete EVent system Specification) formalism. With this model we can simulate whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. Each agent cooperates through the BBA (Black Board Architecture) for detecting intrusions. If an agent detects intrusions, it transfers attacker’s information to a Firewall. Using this mechanism attacker’s packets detected by IDS can be prevented from damaging the network.

Cite

CITATION STYLE

APA

Seo, H. S., & Cho, T. H. (2001). Simulation of network security with collaboration among IDS models. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2256, pp. 438–448). Springer Verlag. https://doi.org/10.1007/3-540-45656-2_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free