Author/Authors :
Javidi، Mohammad Masoud نويسنده , , Nattaj، Mohammad Hassan نويسنده ,
Abstract :
Since it is technically impossible to create computer systems (Hardware & Software) without any defect or security failure, intrusion detection in computer systems’ researches is specifically regarded as important.IDS is a protective system that can detect disorders occurring on the network. The procedure goes as intrusion detection can report and control occurred disorders through steps including collecting data, seeking ports, controlling computers, and finally hacking. So, intrusion detection can report control intrusion sabotage that composed of phases collecting data, probing port, gaining computer’s control and finally hacking. In this paper, we consider some different agents, each of which can detect one or two DOS attacks. These agents interact in a way not to interfere each other. Parallelization Technology is used to increase system speed. Since the designed agents act separately and the result of each agent has no impact on the others, you can run each system on discrete CPUs (depending on how many CPUs are used in IDS computers) to speed up the performance.