PERFORMANCE ANALYSIS OF INTRUSION DETECTION SYSTEM NETWORK-BASED (NIDS) USE QUEUE NETWORK
Intrusion detection systems (IDS) play an important and necessary role in the LAN connection structure to ensure the security of a facility: public authorities, businesses, schools, etc... Today, the increase in network attacks is increasing the demand big about types IDS. The technology of IDS, security solutions that IDS perform increased performance in ensuring network security. Therefore, the performance analysis of IDS is a problem be interested, research. This paper proposes the use of a queue model to analyze the performance of Intrusion detection system Relies on network connection, one of the consequence methods (one of the effective methods).
Hồ Khánh Lâm, (2015), “Mạng hàng đợi và chuỗi Markov: lý thuyết và ứng dụng”, NXB KHKT.
Sergey Zapechnikov, Natalia Miloslavskaya, Alexander Tolstoy, “Analysis of Intrusion Detection and Prevention Systems as Queueing Services”, Cyberneticsand Information Security Faculty, Information Security of BankingSystems Department, National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Moscow, Russia. Switzerland, Crans-Montana, 24 March 2016.
Wei T. Yue, Metin Cakanyildirim, Young U. Ryu, “A Queuing Formulation of Intrusion Detection with Active and Passive Responses”, Department of Information Systems and Operations Management School of Management The University of Texas at Dallas Richardson, Texas 75083-0688, USA.
Khaled Salah, “Performance Modeling and Analysis of Network Firewalls”. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 9, NO. 1, MARCH 2012.
Preeti Saini Ms. Sunila Godara, “Modelling Intrusion Detection System using Hidden Markov Model: A Review”. International Journal of Advanced Research in Computer Science and Software Engineering. Volume 4, Issue 6, June 2014. ISSN: 2277 128X.
Amit Kumar Choudhary and Akhilesh Swarup, “Performance of Intrusion Detection System using GRNN”. IJCSNS International Journal of Computer Science and Network Security, Vol.9, No.12, December 2009.
Devarakonda, Nagaraju, et al. “Intrusion Detection System using Bayesian Network and Hidden Markov Model.” Procedia Technology 4 (2012): 506-514.
Khosronejad, Mahsa, et al. “Developing a Hybrid Method of Hidden Markov Models and C5. 0 as a Intrusion Detection System.” International Journal of Database Theory & Application 6.5 (2013).
John C.S. Lui, “Introduction to Queueing Networks”. Department of Computer Science & Engineering The Chinese University of Hong Kong.
Politecnico di Milano Italy, Imperial College London, “JMT Java Modelling Tools, user manual for JMT version 1.0.1 and above, May 4th, 2017”. http://jmt.sourceforge.net/Papers/JMT_users_Manual.pdf.