보안 모델의 연동을 위한 블랙보드구조의 적용

An Application of Blackboard Architecture for the Coordination among the Security Systems

  • 서희석 (성균관대학교 정보통신공학부) ;
  • 조대호 (성균관대학교 정보통신공학부)
  • 발행 : 2002.12.01

초록

The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of amy one system to deal with the intrusions. That the multiple IDSes (Intrusion Detection System) coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (BlackBoard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (BlackBoard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete EVent system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses these detection information.

키워드

참고문헌

  1. Building Internet Firewalls(second edition) E. D. Zwicky;S. Cooper;D. B. Chapman
  2. Intrusion Detection-An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response E. Amoroso
  3. Hacking Exposed: Network Security Secrets and Solutions S Mclure;J. Scambray;G. Kurtz
  4. Intrusion Detection R. Bace
  5. Computer & Security v.18 Simulating Cyber Attacks, Defences, and Consequences F. Cohen
  6. Lecture Notes on Artificial Intelligence Simulation of Network Security with Collaboration among IDS Models Seo, Hee Suk;Cho, Tae Ho
  7. Proceedings of International conference on Security and Management Modeling and Simulation of Network Security with the Coordination of IDSes and Firewall Seo, Hee Suk;Cho, Tae Ho
  8. International Journal of Production Research v.36 no.6 A Conceptual Framework for Interactive and Blackboard Based CAPP G. Van Zeir;J. P. Kruth;J. Detand
  9. International Journal of pattern Recognition and Artificial Intelligence v.7 no.2 Control Heuristics for Scheduling in a Parallel Blackboard System K. Decker;A. Garvey;M. Humphrey;V. R. Lesser
  10. IJCAI-95 Workshop on Computational Auditory Scene Analysis The IPUS Blackboard Architecture as a Framework for Computational Auditory Scene Analysis F. Klassner;V. R. Lesser;S. H. Nawab
  11. Object-Oriented Simulation with Hierarchical, Modular Models B. P. Zeigler
  12. Theory of Modeling and Simulation B. P. Zeigler
  13. IEEE trans. Syst. Man, Cyber. A v.27 Simulation of Intelligent Hierarchical Flexible Manufacturing: Batch Job Routing in Operation Overlapping T.H. Cho;Bernard P. Zeigler
  14. IEEE Software A Software Platform for Testing Intrusion Detection Systems N. Puketza;M. Chung;R. Olsson;B. Mukherjee
  15. Proceedings of the IEEE Symposium on Security and Privacy Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST) U. Lindqvist;P. A. Porras
  16. Proceedings of the 20th National Information Systems Security Conference EMERALD: Event Monitoring Enabling Responses to anomalous live disturbances P. Porras;P. Neumann
  17. Technical Report No. 95-008, COAST Group, Dept. of Computer Science, Purdue University Active Defence of a Computer System using Autonomous Agents M. Crosbie;G. Spafford
  18. Proceedings of the 12th National Computer Security Conference A Summary of computer misuse techniques P. Neumann;D. Parker
  19. Proceedings of IEEE International Conference on ICON 2000 Policy based access control framework for large networks Duan Haixin;Wu Jianping;Li Xing
  20. Proceeding of TENCON 2000 On Firewalls Evaluation Criteria Noureldien A. Noureldien;Izzeldin M. Osman
  21. TCP/IP Protocol Suite B. A. Forouzan
  22. Proceedings of Command and Control Research and Technology Symposium A Distributed Autonomous-Agent Network-Intrusion Detection and Response System J. Barrus;N. C. Rowe