Skip to main content

Modeling and Simulation for Detecting a Distributed Denial of Service Attack

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2557))

Abstract

The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of any one system to deal with the intrusions. This paper shows a modeling and simulation of network security in which the multiple IDSes (Intrusion Detection System) and a firewall coordinate by sharing attacker’s information for the effective detection of the intrusion. Another characteristic in the proposed simulation is the composition of a real intrusion by generating non-abstracted intrusion packets and, accordingly, the construction of non-abstracted version of IDS and firewall model components.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. E. D. Zwicky, S. Cooper, D. B. Chapman, “Building Internet Firewalls second edition”, O’reilly & Associates, 2000.

    Google Scholar 

  2. R. Bace, “Intrusion Detection”, Macmillan Technical Publishing, 2000.

    Google Scholar 

  3. E. Amoroso, “Intrusion Detection — An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response”, Intrusion.Net Books, 1999.

    Google Scholar 

  4. P. Neumann and D. Parker, “A Summary of computer misuse techniques”, In Proceedings of the 12th National Computer Security Conference, pp. 396–407, October 1989.

    Google Scholar 

  5. N. Puketza, M. Chung, R. Olsson, B. Mukherjee, “A Software Platform for Testing Intrusion Detection Systems”, IEEE Software, pp.43–51, October 1997.

    Google Scholar 

  6. F. Cohen, “Simulating Cyber Attacks, Defences, and Consequences”, Computer & Security, Vol.18, pp. 479–518,1999.

    Article  Google Scholar 

  7. Duan Haixin, Wu Jianping, Li Xing, “Policy based access control framework for large networks”, Proceedings of IEEE International Conference on ICON 2000, Sept. 2000.

    Google Scholar 

  8. Noureldien A. Noureldien, Izzeldin M. Osman, “On Firewalls Evaluation Criteria”, Proceeding of TENCON 2000, pp 104–110, Sept. 2000.

    Google Scholar 

  9. B. P. Zeigler, “Object-Oriented Simulation with Hierarchical, Modular Models”, USA:Academic Press, San Diego CA, 1990.

    Google Scholar 

  10. B. P. Zeigler, “Theory of Modeling and Simulation”, John Wiley, NY, USA, 1976, reissued by Krieger, Malabar, FL, USA, 1985.

    Google Scholar 

  11. T.H. Cho, Bernard P. Zeigler, “Simulation of Intelligent Hierarchical Flexible Manufacturing: Batch Job Routing in Operation Overlapping”, IEEE trans. Syst. Man, Cyber. A, Vol. 27, pp.116–126,Jan. 1997.

    Google Scholar 

  12. S Mclure, J. Scambray, G. Kurtz, “Hacking Exposed: Network Security Secrets and Solutions”, McGraw-Hill, 1999.

    Google Scholar 

  13. U. Lindqvist, P. A. Porras, “Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset(P-BEST)”, Proceedings of the IEEE Symposium on Security and Privacy, Oakland California, May 9-12 1999.

    Google Scholar 

  14. P. Porras and P. Neumann, “EMERALD: Event Monitoring Enabling Responses to anomalous live disturbances”, Proceedings of the 20th National Information Systems Security Conference, National Institute of Standards an Technology, 1997.

    Google Scholar 

  15. M. Crosbie and G. Spafford, “Active Defence of a Computer System using Autonomous Agents”, Technical Report No. 95-008, COAST Group, Dept. of Computer Science, Purdue University, Feb. 15,1995.

    Google Scholar 

  16. G. Van Zeir, J. P. Kruth, J. Detand, “A Conceptual Framework for Interactive and Blackboard Based CAPP”, International Journal of Production Research, Vol. 36(6), pp. 1453–1473,1998.

    Article  MATH  Google Scholar 

  17. K. Decker, A. Garvey, M. Humphrey, V. R. Lesser, “Control Heuristics for Scheduling in a Parallel Blackboard System”, International Journal of pattern Recognition and Artificial Intelligence, Vol. 7, No. 2, pp. 243–264,1993.

    Article  Google Scholar 

  18. F. Klassner, V. R. Lesser, S. H. Nawab, “The IPUS Blackboard Architecture as a Framework for Computational Auditory Scene Analysis”, IJCAI-95 Workshop on Computational Auditory Scene Analysis, Montreal, Canada, August 1995.

    Google Scholar 

  19. B. A. Forouzan, “TCP/IP Protocol Suite”, McGrawHill, 2000.

    Google Scholar 

  20. J. Barrus, N. C. Rowe, “A Distributed Autonomous-Agent Network-Intrusion Detection and Response System”, Proceedings of Command and Control Research and Technology Symposium, pp. 577–586, Monterey CA, June 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seo, H.S., Cho, T.H. (2002). Modeling and Simulation for Detecting a Distributed Denial of Service Attack. In: McKay, B., Slaney, J. (eds) AI 2002: Advances in Artificial Intelligence. AI 2002. Lecture Notes in Computer Science(), vol 2557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36187-1_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-36187-1_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00197-3

  • Online ISBN: 978-3-540-36187-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics