The Genesis Project: Network Decomposition in Monitoring and Simulation for Network Management and Intrusion Detection
نویسندگان
چکیده
Genesis proposes a novel approach to scalability and efficiency of parallel network monitoring, modeling and simulation for network management and intrusion detection. The basis of our approach is network decomposition that creates separate network domains. Each domain is independently monitored, modeled and simulated by separate software components. Domain monitoring involves a repository of data and collection agents while models and simulations are run by dedicated processor clusters allocated to each domain. Repositories and simulators collaborate on exchanging data and models to keep the network simulations consistent between domains. One of the desirable features of our design is its independence from the underlying simulators and repositories running in the individual domains. Hence, our architecture can be integrated with a number of existing technologies thereby supporting system interoperability. Our primary application is network management. The simulation in this application predicts changes in the network performance caused by network parameter tuning. Growing security threats to networks increase the importance of intrusion and anomaly detection. Using data collection agents, we create unique signatures for attacks or legitimate user activities (monitoring a stream of network packets at the server). Signatures are represented as probabilistic or time-dependent finite state automata and their parsers can easily be embedded into mobile agents. Genesis is useful in all applications in which speed of the simulation is of essence, such as: on-line network simulation, network management, ad-hoc network design, emergency network planning, or Internet simulation for computer networks. In addition to computer and communication networks, Genesis can also be used to simulate networks of flows of goods and products, vehicles, populations, etc. Keywords— Network Monitoring, Network Management, Network Simulation, Parallel Simulation, Intrusion Detection.
منابع مشابه
The Genesis Project: Network Decomposition Monitoring and Simulation for Network Management and Intrusion Detection
متن کامل
A New Method for Intrusion Detection Using Genetic Algorithm and Neural Network
The article attempts to have neural network and genetic algorithm techniques present a model for classification on dataset. The goal is design model can the subject acted a firewall in network and this model with compound optimized algorithms create reliability and accuracy and reduce error rate couse of this is article use feedback neural network and compared to previous methods increase a...
متن کاملA New Method for Intrusion Detection Using Genetic Algorithm and Neural Network
The article attempts to have neural network and genetic algorithm techniques present a model for classification on dataset. The goal is design model can the subject acted a firewall in network and this model with compound optimized algorithms create reliability and accuracy and reduce error rate couse of this is article use feedback neural network and compared to previous methods increase a...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملA New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003