Tytuł artykułu
Autorzy
Identyfikatory
Warianty tytułu
Konferencja
Information Technology and Knowledge Management ITKM'08 / sympozjum [1; 17-18.04.2008; Jastrzębia Góra]
Języki publikacji
Abstrakty
The paper is devoted to discuss and to present some selected aspects of intrusion detection in distributed purposes. To present the proposed approach a model of computer communicationnetworks is proposed as well as idea of quality of distributed monitoring systemsupporting intrusion detection in distributed environment. In the proposed and discussedhierarchical model and formulated optimization tasks some selected parameters describingfeatures of monitored communication network and distributed monitoring systems weretaken into account. It was assumed that distinguished subsets of communication network are monitored locally and autonomously. Moreover, it was assumed that the local monitoring systems do not cooperate. The proposed approach was illustrated by simple examples.
Słowa kluczowe
Rocznik
Tom
Strony
51--64
Opis fizyczny
Bibliogr. 10 poz.
Twórcy
autor
autor
- Institute of Information Science and Engineering Wroclaw University of Technology, Poland, adam.grzech@pwr.wroc.pl
Bibliografia
- [1]Denning D.E., An intrusion detection model, IEEE Transactions on Software Engineering, 1987, Vol. 13, No. 2, 222-232.
- [2]Gorodetski V., Karsaev O., Khabalov A., Kotenko I., Popyack I, Skormin V., Agentbased model of computer network security system: a case study, Lecture Notes in Computer Science, 2004, Vol. 2052, 39-50.
- [3]Grzech A., Anomaly detection in distributed computer communication systems, Cybernetics and Systems, 2006, Vol. 37, No 6, 635-652.
- [4]Grzech A., Hierarchical detection of anomaly activities in distributed computer communication systems, in: proceedings of the Eighteenth International Conference on Systems Engineering, Coventry University, 2006, 137-142.
- [5]Juszczyszyn K., Nguyen N.T., Kołaczek G., Grzech A., Pieczyńska A., Katarzyniak R., Agent-based approach for distributed intrusion detection system design, Lecture Notes in Computer Science, 2006, Vol. 3993, 224-231.
- [6]Kołaczek G., Pieczyńska-Kuchtiak A., Juszczyszyn K, Grzech A., Katarzyniak R., Nguyen N.T., A mobile agent approach to intrusion detection in network systems, Lecture Notes in Computer Science, Lecture Notes in Artificial Intelligence, 2006, Vol. 3682,514-519.
- [7]Kotenko I. et al., Multi-agent modelling and simulation of distributed Denial-of--Service attacks on computer networks, in: Proceedings of Third International Conference Navy and Shipbuilding Nowaday. St. Petersburg, 2003, 38-47.
- [8]Liao Yihua, Machine Learning in Intrusion Detection, Ph.D. Thesis, University of California, 2005.
- [9]Nicol D., Liljenstam M., Liu J., Multi-scale modelling and simulation of worm effects on the internet routing infrastructure, in: Proceedings of Performance Tools Conference, 2003, 1-10.
- [10]Varga A., OMNET++ discrete event simulation system (http://www.omnetpp.org).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPP1-0092-0057