Abstract | ||
---|---|---|
It is quite necessary that an organization's information network should be equipped with a proper security system based on its scale and importance. One of the effective methods is to use the simulation model for deciding which security policy and mechanism is appropriate for the complex network. The need arises for systems to coordinate with one another, to manage diverse attacks across networks. The coordination issue is the essential problem since it is beyond the scope of any one IDS (Intrusion Detection System) to deal with the intrusions. This paper shows a modeling and simulation of network security in which the multi-security agents coordinate by sharing attacker's information for the effective detection of the intrusion. |
Year | DOI | Venue |
---|---|---|
2003 | 10.1007/3-540-44864-0_83 | International Conference on Computational Science |
Keywords | Field | DocType |
intrusion detection system,simulation model,effective method,effective detection,security policy,coordination issue,network security,security model,information network,proper security system,complex network,modeling and simulation | Security testing,Network security policy,Vulnerability (computing),Computer science,Computer security,Network security,Security information and event management,Network Access Control,Intrusion detection system,Computer security model,Distributed computing | Conference |
Volume | ISSN | ISBN |
2660 | 0302-9743 | 3-540-40197-0 |
Citations | PageRank | References |
1 | 0.40 | 2 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
hee suk seo | 1 | 19 | 6.35 |
Tae Ho Cho | 2 | 159 | 26.82 |
Sung-Do Chi | 3 | 77 | 11.81 |