Modeling and simulation for detecting a distributed denial of service attack

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of any one system to deal with the intrusions. This paper shows a modeling and simulation of network security in which the multiple IDSes (Intrusion Detection System) and a firewall coordinate by sharing attacker's information for the effective detection of the intrusion. Another characteristic in the proposed simulation is the composition of a real intrusion by generating non-abstracted intrusion packets and, accordingly, the construction of non-abstracted version of IDS and firewall model components.

Cite

CITATION STYLE

APA

Seo, H. S., & Cho, T. H. (2002). Modeling and simulation for detecting a distributed denial of service attack. In Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) (Vol. 2557, pp. 179–190). Springer Verlag. https://doi.org/10.1007/3-540-36187-1_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free