Browse > Article

Secured Verification of Intrusion Prevention System Security Model Based on CPNs  

Lee, Moon-Goo (Div. of IT, Dept. of Internet Information, Kimpo College)
Publication Information
Abstract
Intrusion prevention systems (IPS) are important solution about solved problems for inside system security or outsider attacks. When introduce this system, first consideration item is secured rather than multiple function. Colored Petri Nets (CPNs) used that in order to secured verification for user authentication function of intrusion prevention system security model. CPNs is a graphical modeling language suitable for modeling distributed, concurrent, deterministic or non-deterministic systems with synchronous. Like these CPNs was expressed every possible state and occurrence graph. Secured of IPS security model was verified because expression every state using CPN tool and as a result of analyzing the occurrence graph was without a loop or interruption.
Keywords
Colored Petri Nets; Intrusion prevention systems; User Authentication; Occurrence graph;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Hui Kang, Xiuli Yang, Sinmiao Yuan, "Modeling and Verification of Web Services Composition based on CPN," npc, pp.613-617, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007), 2007.
2 Jaegeol Yim, Seunghwan Jeong, Jaehun Joo, "Colored Petri Net Representation of RDF Models," fgcns, vol. 5, pp.46-51, 2008 Second International Conference on Future Generation Communication and Networking Symposia, 2008.
3 Lian-zhang Zhu, Hua Zhang, "Queuing Network Models Analysis Based on CPN," icic, vol. 2, pp.269-272, 2009 Second International Conference on Information and Computing Science, 2009.
4 Vijay Gehlot, "Systems Modeling and Analysis Using Colored Petri Nets", IEEE Systems Conference 2008.
5 Xiang Wang, Yaxuan Qi, Baohua Yang, Yibo Xue, Jun Li, "Towards High-Performance Network Intrusion Prevention System on Multi-core Network Services Processor," IEEE icpads, pp.220-227, 2009 15th International Conference on Parallel and Distributed Systems, 2009.
6 Xinyou Zhang, Chengzhong Li, Wenbin Zheng, "Intrusion Prevention System Design," cit, pp.386-390, Fourth International Conference on Computer and Information Technology (CIT'04), 2004.
7 Yanxiang He; Tao Liu; Hai Zhong; Qi Xiong, "A CPN-Based Simulation Platform for Analysis and Defense Design of Internet End-Systems Targeted Attacks" FCST(Frontier of Computer Science and Technology) '09. Fourth International Conference, pp.548 - 552, 2009.
8 Yongwei Wang; Shaowen Yao; Ying Zhao; Mingtian Zhou, "CPN modeling and analysis of L2TP" Computer Networks and Mobile Computing, pp.281 - 288, 2001.
9 http://www.daimi.au.dk/CPnets/intro/example_indu.html
10 안정철 " 침입방지시스템과 역할기반 보안정책을 이용한 정부기관 정보보호 시스템 설계" 한국정보보호학회, 정보보호학회논문지, 제14권 제6호 2004.12, page(s): 91-103
11 이문구 "침입차단 방화벽 시스템을 위한 FTP 프록시 모델의 설계 및 안정성 검증" 숭실대학교 대학원, 컴퓨터학과, 박사학위논문, 1999. 12.