PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Quality of distributed monitoring system for detection of network traffic anomalies

Identyfikatory
Warianty tytułu
Konferencja
Information Technology and Knowledge Management ITKM'08 / sympozjum [1; 17-18.04.2008; Jastrzębia Góra]
Języki publikacji
EN
Abstrakty
EN
The paper is devoted to discuss and to present some selected aspects of intrusion detection in distributed purposes. To present the proposed approach a model of computer communicationnetworks is proposed as well as idea of quality of distributed monitoring systemsupporting intrusion detection in distributed environment. In the proposed and discussedhierarchical model and formulated optimization tasks some selected parameters describingfeatures of monitored communication network and distributed monitoring systems weretaken into account. It was assumed that distinguished subsets of communication network are monitored locally and autonomously. Moreover, it was assumed that the local monitoring systems do not cooperate. The proposed approach was illustrated by simple examples.
Rocznik
Tom
Strony
51--64
Opis fizyczny
Bibliogr. 10 poz.
Twórcy
autor
Bibliografia
  • [1]Denning D.E., An intrusion detection model, IEEE Transactions on Software Engineering, 1987, Vol. 13, No. 2, 222-232.
  • [2]Gorodetski V., Karsaev O., Khabalov A., Kotenko I., Popyack I, Skormin V., Agentbased model of computer network security system: a case study, Lecture Notes in Computer Science, 2004, Vol. 2052, 39-50.
  • [3]Grzech A., Anomaly detection in distributed computer communication systems, Cybernetics and Systems, 2006, Vol. 37, No 6, 635-652.
  • [4]Grzech A., Hierarchical detection of anomaly activities in distributed computer communication systems, in: proceedings of the Eighteenth International Conference on Systems Engineering, Coventry University, 2006, 137-142.
  • [5]Juszczyszyn K., Nguyen N.T., Kołaczek G., Grzech A., Pieczyńska A., Katarzyniak R., Agent-based approach for distributed intrusion detection system design, Lecture Notes in Computer Science, 2006, Vol. 3993, 224-231.
  • [6]Kołaczek G., Pieczyńska-Kuchtiak A., Juszczyszyn K, Grzech A., Katarzyniak R., Nguyen N.T., A mobile agent approach to intrusion detection in network systems, Lecture Notes in Computer Science, Lecture Notes in Artificial Intelligence, 2006, Vol. 3682,514-519.
  • [7]Kotenko I. et al., Multi-agent modelling and simulation of distributed Denial-of--Service attacks on computer networks, in: Proceedings of Third International Conference Navy and Shipbuilding Nowaday. St. Petersburg, 2003, 38-47.
  • [8]Liao Yihua, Machine Learning in Intrusion Detection, Ph.D. Thesis, University of California, 2005.
  • [9]Nicol D., Liljenstam M., Liu J., Multi-scale modelling and simulation of worm effects on the internet routing infrastructure, in: Proceedings of Performance Tools Conference, 2003, 1-10.
  • [10]Varga A., OMNET++ discrete event simulation system (http://www.omnetpp.org).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPP1-0092-0057
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.