• Title/Summary/Keyword: DEVS simulation

Search Result 271, Processing Time 0.024 seconds

Security Simulation with Collaboration of Intrusion Detection System and Firewall (침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.1
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF

Modeling and simulation of CNP-applied network security models with application of fuzzy rule-based system (퍼지를 적용한 계약망 프로토콜 기반의 네트워크 보안 모델의 설계 및 시뮬레이션)

  • Lee Jin-ah;Cho Tae-ho
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.1
    • /
    • pp.9-18
    • /
    • 2005
  • Attempts to attack hosts in the network have become diverse, due to crackers developments of new creative attacking methods. Under these circumstances the role of intrusion detection system as a security system component gets considerably importance. Therefore, in this paper, we have suggested multiple intrusion detection system based on the contract net protocol which provides the communication among multiple agents. In this architecture, fuzzy rule based system has been applied for agent selection among agents competing for being activated. The simulation models are designed and implemented based on DEVS formalism which is theoretically well grounded means of expressing discrete event simulation models.

  • PDF

Modeling and Simulation of Policy-based Network Security

  • Lee, Won-young;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.155-162
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. Policy-based network provides a means by which the management process can be simplified and largely automated. In this paper we build a foundation of policy-based network modeling and simulation environment. The procedure and structure for the induction of policy rules from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Base) are developed. The structure also transforms the policy rules into PCIM (Policy Core Information Model). The effect on a particular policy can be tested and analyzed through the simulation with the PCIMs and SVDB.

  • PDF

Modeling and Simulation of Security System on Policy-based Framework (정책 기반의 프레임워크에서의 보안 시스템 모델링 및 시뮬레이션)

  • 이원영;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.11a
    • /
    • pp.127-132
    • /
    • 2003
  • 현재의 네트워크는 다양한 서버, 라우터, 스위치 등 여러 장치들로 구성된 복잡한 구조를 가지고 있다. 정책 기반의 프레임워크는 복잡한 네트워크를 단순화하고 자동화하여 관리할 수 있는 도구를 제공한다. 본 논문에서는 여러 보안 시스템 모델들이 사용할 수 있는 취약성 정보들을 집약시킴으로써 보안 시스템간의 정보 공유를 쉽게 할 수 있는 SVDB (Simulation based Vulnerability Data Base)를 구축하였다. 또한 SVDB를 활용하여 보안 규칙을 유도하고 유도된 보안 규칙을 정책 기반 프레임워크에 적용할 수 있는 환경을 구성하였다. 정책 기반의 프레임워크에서 취약점 데이터베이스를 이용한 정책 유도와 적용을 검증하기 위해 서비스 거부 공격 (Denial of Service)과 Probing 공격을 사용하여 시뮬레이션을 수행하였다. 정책 기반의 프레임워크에서 보안 시뮬레이션을 수행함으로써 적용될 보안 정책이 기대되는 대로 동작하는지 검증할 수 있는 환경을 제공할 수 있을 것이다.

  • PDF

An Application of RETE Algorithm for Improving the Inference Performance in the Coordination Architecture (연동 구조 내의 추론 성능 향상을 위한 RETE 알고리즘의 적용)

  • 서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.965-974
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the knowledge-based network security model, each model of simulation environment is hierarchically designed by DEVS (Discrete Event system Specification) formalism. The purpose of this simulation is the application of rete pattern-matching algorithm speeding up the inference cycle phases of the intrusion detection expert system. we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

DEVS Modeling and Simulation for spectral characteristic on the strip of urin examination (뇨 분석용 strip의 분광학적 특성분석을 위한 DEVS 모델링 및 시뮬레이션)

  • Cho, Y.J.;Kim, J.H.;Nam, K.G.;Kim, J.H.;Jun, K.R.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1997 no.05
    • /
    • pp.145-149
    • /
    • 1997
  • This paper describes a methodology for the development of models of discrete event system. The methodology is based on transformation of continuous state space into discrete one to homomorphically represent dynamics of continuous processes in discrete events. This paper proposes a formal structure which can coupled discrete event system models within a framework. The structure employs the discrete event specification formalism for the discrete event system models. The proposed formal structure has been applied to develop a discrete event specification model for the complex spectral density analysis of strip for urin analyzer system. For this, spectral density data of strip is partitioned into a set of Phases based on events identified through urine spectrophotometry. For each phase, a continuous system of the continuous model for the urine spectral density analysis has been simulated by programmed C++. To validate this model, first develop the discrets event specification model, then simulate the model in the DEVSIM++ environment. It has the similar simulation results for the data obtained from the continuous system simulation. The comparison shows that the discrete event specification model represents dynamics of the urine spectral density at each phase.

  • PDF

Efficient Grid Resource Scheduling Model with Resource Reliability Measurement (자원 신뢰성 측정을 통한 효율적인 그리드 자원 스케줄링 모델)

  • Park, Da-Hye;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.129-136
    • /
    • 2006
  • Grid computing has been appeared for solving large-scaled data which are not solved by a single computer. Grid computing is a new generation platform which connects geographically distributed heterogeneous resources. However, gathering heterogeneous distributed resources produces many difficult problems. Especially. to assure resource reliability is one of the most critical problems. So, we propose a grid resource scheduling model using grid resource reliability measurement. We evaluate resource reliability based on resource status data and apply it to the grid scheduling model in DEVSJAVA modeling and simulation. This paper evaluates parameters such as resource utilization, job loss and average turn-around time and estimates experiment results of our model in comparison with those of existing scheduling models such as a random scheduling model and a round-robin scheduling model. These experiment results showed that the resource reliability measurement scheduling model provides efficient resource allocation and stable Job processing in comparison with a random scheduling model and a round-robin scheduling model.

  • PDF

Late Comer and Error Recovery Process for Home Network Environment with Session Management (세션 관리 기능을 포함한 홈 네트워크 환경에서의 지각자 및 오류 복구 처리)

  • Kim, Hak-Joon;Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.666-672
    • /
    • 2008
  • This paper explains late comer and error recovery process for home network environment with session management. This system consists of an ED, ES, and ER. ED is an agent that detects an error by hooking techniques for multimedia distance education based on home network environment with session management. ES is an agent that is an error sharing system for multimedia distance education based on home network environment with session management. ER is a system that is suitable for recovering software error for multimedia distance education based on home network environment with session management. This paper explains a performance analysis of an error recovery system running on distributed multimedia environment using the rule-based DEVS modeling and simulation techniques. The proposed method is more efficient than the other method in comparison with error ration and processing time.

  • PDF

Symbolic Simulation of Discrete Event Systems (이산 사건 시스템의 기호적 시뮬레이션)

  • 지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1992.10a
    • /
    • pp.7-7
    • /
    • 1992
  • Extending discrete event modelling formalisms to facilitate greater symbol manipulation capabilities is important to further their use in intelligent control and design of high autonomy systems. This paper defines an extension to the DEVS formalism that facilitates symbolic expression of discrete event times by extending the time base from the real numbers to the field of linear polynomials over the reals. A simulation algorithm is developed to generate the branching trajectories resulting from the underlying non-determinism. To efficiently manage linear polynomial constraints based on feasibility checking algorithm borrowed from linear programming. The extended formalism offers a convenient means to conduct multiple, simultaneous explorations of model behaviors. Examples of application are given with consideration on fault model analysis.

  • PDF

High-level Discrete-event Modeling-based Business Process Simulation for the Scheduling of the Ship Hull Production Design (조선 선체 생산설계 일정 계획을 위한 상세 이산사건 모델링기반 비즈니스 프로세스 시뮬레이션)

  • Son, Myeong-Jo;Kim, Tae-Wan
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.3
    • /
    • pp.224-233
    • /
    • 2013
  • For the scheduling and the job assignment of the ship hull production design which is a process-based work, we suggest the simulation-based scheduling using the discrete-event-based business process simulation. First, we analyze the ship hull production design process from the perspective of a job assignment to make it into the simulation model using DEVS (Discrete Event System Specification) which is the representative modeling method for a discrete-event simulation. Based on the APIs of the open-source discrete-event simulation engine, we implement the simulation using the Groovy script. We develop the scenario generator in which the user defines detail information of the construction drawing and its member blocks, and design engineers information, and the various setting for the simulation including the job assignment strategy. We use the XML files from this scenario generator as inputs of simulation so that we can get simulation result in forms of Gantt chart without changes of the simulation model.