Modeling and simulation for detecting a distributed denial of service attack

被引:0
|
作者
Seo, HS [1 ]
Cho, HT [1 ]
机构
[1] Sungkyunkwan Univ, Sch Elect & Comp Engn, Modeling & Simulat Lab, Suwon 440746, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of any one system to deal with the intrusions. This paper shows a modeling and simulation of network security in which the multiple IDSes (Intrusion Detection System) and a firewall coordinate by sharing attacker's information for the effective detection of the intrusion. Another characteristic in the proposed simulation is the composition of a real intrusion by generating non-abstracted intrusion packets and, accordingly, the construction of non-abstracted version of IDS and firewall model components.
引用
收藏
页码:179 / 190
页数:12
相关论文
共 50 条
  • [1] Detecting distributed denial of service attack traffic at the agent machines
    Laurens, Vicky
    El Saddik, Abdulmotaleb
    Dhar, Pulak
    Srivastava, Vineet
    [J]. 2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 2278 - +
  • [2] Detecting Distributed Denial-of-Service Attack Traffic by Statistical Test
    Chen, Chin-Ling
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1190 - 1194
  • [3] Modeling Distributed Denial of Service Attack in Advanced Metering Infrastructure
    Guo, Yonghe
    Ten, Chee-Wooi
    Hu, Shiyan
    Weaver, Wayne W.
    [J]. 2015 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2015,
  • [4] Modeling Distributed Denial of Service Attack in Advanced Metering Infrastructure
    Guo, Yonghe
    Ten, Chee-Wooi
    Hu, Shiyan
    Weaver, Wayne W.
    [J]. 2015 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2015,
  • [5] A survey of Distributed Denial of Service attack
    Mallikarjunan, K. Narasimha
    Muthupriya, K.
    Shalinie, S. Mercy
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [6] Massive distributed denial of service attack
    不详
    [J]. COMPUTERS & SECURITY, 2003, 22 (06) : 465 - 465
  • [7] Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion
    Cheng, Jieren
    Yin, Jianping
    Liu, Yun
    Cai, Zhiping
    Wu, Chengkun
    [J]. SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 132 - 139
  • [8] Using simulation to evaluate decisive action in Distributed Denial of Service attack
    Iwu, FO
    Zobel, RN
    [J]. SIMULATION IN INDUSTRY 2001, 2001, : 92 - 99
  • [9] Formalized Description of Distributed Denial of Service Attack
    杜彦辉
    马锐
    刘玉树
    [J]. Journal of Beijing Institute of Technology, 2004, (04) : 360 - 364
  • [10] Distributed Denial of Service: Attack techniques and mitigation
    Vanitha, K. S.
    Uma, S. V.
    Mahidhar, S. K.
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROLS, AND COMMUNICATIONS (CCUBE), 2017, : 226 - 231