계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • 서경진 (성균관대학교 정보통신공학부) ;
  • 조대호 (성균관대학교 정보통신공학부)
  • 발행 : 2003.12.01

초록

With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

키워드

참고문헌

  1. Computer Networks and Mobile Computing 2001 Proceedings. 2001 International Conference A network state based intrucsion detection model Shan Zheng;Chen Peng;Xu Ying;Xu Ke
  2. Intrusion Detection R,Base
  3. Intrusion.Net Books Intrusion Detection - An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response E.Amoroso
  4. Proceedings. IEEE International Conference on ICON 2000 Policy based access control framework for large networks Duan Haixin;Wu Jianping;Li Xing
  5. Proceeding of TENCON 2000 On Firewalls Evaluation Criteria Noureldien A. Noureldien;Izzeldin M. Osman
  6. IEEE SMC ’99 Conference Proceedings International Conference on v.3 Simulation of a Multi-agent Protocol for Task Allocation in Cooperative Design K.M.Sim;S.K.Shiu;B.L.Martin
  7. Computer Science v.26 no.9 Theories, Technology and Application of Multi-Agent Systems Shungeng Hu;Li Zhang;Yixin Zhong
  8. 11th National Conference on Artificial Intelligenece (AAAI-93) An Implementation of the Contract Net Protocol based on Marginal Cost Calculations T.Sandholm
  9. Information Technology Conference IEEE Coordination of Distrbuted Knowledge Networks Using Contract Net Protocol Jihoon Yang;Raghu Havaldar;Vasant Honavar;Les Miler;Johy Wong
  10. IEEE Transactions on Computers v.C-29 no.12 The Contract Net Protocol: High-level Communication and Control in a distributed problem solver R.Smith
  11. Research Notes in Artificial Intelligence: Distributed Artificial Intelligence v.1 Manufacturing Experince with the Contract Net. H. van Dyke Parunak
  12. IEEE Transactions on Systems, Man and Cybernetics-PART A: System and Humans v.27 no.1 Simulation of Intelligent Hierarchical Flexible Manufacturing : Batch Job Routing in Operation Overlapping Tae H. Cho;Bernard P.Zeigler
  13. IEEE Transactions on Systems, Man and Cybernetics-PART A v.26 no.1 Knowledge Based System for Hierarchical Flexible Manufacturing System Modeling Zegler,B.P.;Cho,T.H.;Rozenbit,J.W.
  14. Simulation Modelling Practice and Theory, Elsevier Science B.V. v.11 no.issues 3-4 An application of blackboard architecture for the coordination among the security systems H.S.Seo;T.H.Cho
  15. 11th National Conference on Artificial Intelligenece (AAAI-96) An implementation of the contract net protocol based on marginal cost calculations T.Sandholm
  16. System Sciences, 1992. Proceedings of the Twenty-Fifrh Hawaii International Conference on v.1 An architecture for real-time inference engines on personal computers V.Devedzic;D.Velasevic
  17. Artificial Intelligence v.19 Rete: A fast algorithm for the many pattern/many object pattern match problem C.L.Forgy