Modeling and Describing Misuse Scenarios Using Signature-Nets and Event Description Language
نویسندگان
چکیده
In the area of intrusion detection the misuse detection approach assumes that relevant activity violating security policies is known a priori and it provides for fast intrusion detection with low false alarm rate, thereby complementing the anomaly detection approach. Hence, misuse detection is an indispensable ingredient to a suitable strategy for intrusion detection. Misuse detection calls for a comprehensive framework for modeling and analysing attack activity. This contribution presents the highly expressive and modular Signature-net framework. Signature-nets allow for visual modeling and simulation of attack detection signatures, as well as for formal analysis. The framework lends itself to highly optimized implementation and may be flexibly deployed, e. g., for network-based and host-based intrusion detection or alarm correlation. und Rechnern und für die Alarmkorrelation. In the area of computer security intrusion detection systems (IDSs) play an important role for the automatic identification of attacks. In addition to preventive security mechanisms they provide post-mortem detection capabilities. A main problem for the detection of security violations using misuse detection systems is the modeling and description of misuse scenarios to be detected. In the following we consider services in the sense of a running software system that provides some service to its users. Such a service is assumed to contain an audit component that observes the service activity.
منابع مشابه
Using Interval Petri Nets and Timed Automata for Diagnosis of Discrete Event Systems (DES)
A discrete event system (DES) is a dynamic system that evolves in accordance with the abrupt occurrence, at possibly unknown irregular intervals, of physical events. Because of the special nature of these systems, different tools are currently used for their analysis, design and modeling. The main focus of this paper is the presentation of a new modeling approach of Discrete Event Systems. The ...
متن کاملIdentifying Modeling Errors in Signatures by Model Checking
Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined patterns. The matching rules are called signatures. The definition of signatures is up to now an empirical process based on expert knowledge and experience. The analysis success and accordingly the acceptance of intrus...
متن کاملBehavioral Modeling and Simulation of Semiconductor Devices and Circuits Using VHDL-AMS
During the past few years, a lot of work has been done on behavioral models and simulation tools. But a need for modeling strategy still remains. The VHDL-AMS language supports the description of analog electronic circuits using Ordinary Differential Algebraic Equations (ODAEs), in addition to its support for describing discrete-event systems. For VHDL-AMS to be useful to the analog design ...
متن کاملAvailability evaluation of Software architecture of object oriented Style using coloured Petri nets
Software architecture is one of the most fundamental products in the process of software development in the areas of behavioral or non- behavioral features like availability or transformability change. There are different ways to evaluate software architecture one of which is the creation of application model. An executable model of software architecture is an official description of architectu...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- it - Information Technology
دوره 54 شماره
صفحات -
تاریخ انتشار 2012