Knowledge-based modeling and simulation of access control system representing security policies

보안정책을 표현하는 침입차단시스템의 지식기반 모델링 및 시뮬레이션

  • 고종영 (성균관대학교 전기전자 및 컴퓨터공학부) ;
  • 이미라 (성균관대학교 전기전자 및 컴퓨터공학부) ;
  • 김형종 (한국정보보호진흥원 기술단) ;
  • 김홍근 (한국정보보호진흥원 기술단) ;
  • 조대호 (성균관대학교 전기전자 및 컴퓨터공학부)
  • Published : 2001.12.01

Abstract

It is quite necessary that an organization's information network should be equipped with a proper security system based on its scale and importance. One of the effective methods is to use the simulation model for deciding which security policy and mechanism is appropriate for the complex network. Our goal is to build a foundation of knowledge-based modeling and simulation environment for the network security. With this environment, users can construct the abstracted model of security mechanisms, apply various security policies, and quantitatively analyze their security performance against possible attacks. In this study, we considered security domain from several points of view and implemented the models based on a systematic modeling approach. We enabled the model to include knowledge in modular fashion and provided well-defined guidelines for transforming security policy to concrete rule set.

Keywords

References

  1. HACKING EXPOSED(2nd Ed.) : Network Security Secrets & Solutions Joel Scambry
  2. Computer & Security v.18 Simulating Cyber Attacks, Defences, and Consequences F. Cohen
  3. Proceeding of TENCON 2000 On Firewalls Ecaluation Criteria A. Noureldien;I.M. Osman
  4. Proceeding of CSAC 24th Annual International Firewall Security : Policies, Testing and Performance Evaluation M.R. Lyu;K.Y. Lau
  5. Security Architecture C.M. King
  6. Fundamentals of Network Security J. E. Canavan
  7. Cryptography and Network Security(2nd ed.) William Stallings
  8. Digital Certificates : Applied Internet Security Jalal Feghhi
  9. NIST, Technology Administration, U.S. An introduction to Computer Security : The NIST Handbook
  10. 정보보호 교육자료 한국정보보호진흥원
  11. Building Internet Firewalls(2nd ed.) E.D. Zwicky
  12. Application Gateways and Stateful Inspection : A Brief Note Comparing and Contrasting Avilio;Blask
  13. ISO/IEC 10181-3
  14. Practical UNIX and Internet security S. Garfinkel;G. Spafford
  15. 보안시스템 전문가들이 공개하는 해킹과 방어 완전 실무 조기준;김훈희
  16. Computer Security Dieter Gollmann
  17. Theory of Modeling and Simulation(2nd ed.) B.P. Zeigler;H. Praehofer;T.G. Kim
  18. Object-Oriented Artificial Intelligence Kim W. Tracy
  19. Artificial Intelligence Patrick H. Winston
  20. Leture Notes on Artifical Intelligence Simulation of Network Security with Collaboration among IDS Models H.S. Seo;T.H. Cho
  21. Transactions of the Society for Computer Simulation International v.18 no.3 DEVS Simulation of Distribution Intrusion Detection System T.H. Cho;Hyungjong Kim