Detecting Breaches in Computer Security: A Pragmatic System with a Logic Programming Flavor

نویسندگان

  • Abdelaziz Mounji
  • Baudouin Le Charlier
چکیده

Computer security is a topic of growing concern because, on the one hand, the power of computers continues to increase at exponential speed and all computers are virtually connected to each other and because, on the other hand, the lack of reliability of software systems may cause dramatic and unrecoverable damage to computer systems and hence to the newly emerging computerized society. Among the possible approaches to improve the current situation, expert systems have been advocated to be an important one. Typical tasks that such expert systems can achieve include evaluating the security level of a software connguration and detecting malicious or incorrect behaviors of users. Logic programming provides a powerful formalism for knowledge representation and deductive reasoning and is therefore a good choice to build such expert systems. However general implementations of logic programming (e.g., Prolog) can be too complex and too ineecient to be used in a security context, where all users' actions should potentially be analyzed in real time. In this paper, we describe a \hand-crafted" system especially designed for watching what is happening in a computer connguration on a real time basis. The system integrates ideas from logic programming, imperative programming and rule-based systems in a pragmatic way. Some aspects of the systems have been presented elsewhere; in this paper, we concentrate on a new component, which is based on the deductive data base approach. Securing computers and network computers against unauthorized access and misuse is a growing concern in the computer community as evidenced by the rising number of press reports about security incidents. There are several means of securing computers, which can be divided into two broad approaches. Access control provides mechanisms for preventing unauthorized external users

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

Bait and Snitch: Defending Computer Systems with Decoys

Threats against computer networks continue to multiply, but existing security solutions are persistently unable to keep pace with these challenges. In this paper we present a new paradigm for securing computational resources which we call decoy technology. This technique involves seeding a system with data that appears authentic but is in fact spurious. Attacks can be detected by monitoring thi...

متن کامل

Detecting Denial of Service Message Flooding Attacks in SIP based Services

Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its ‎security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol ‎‎(SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation ‎deficiencies cause some security concerns in SIP based infra...

متن کامل

Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL)

Internet of Things (IoT) approach is empowering smart city creativities all over the world. There is no specific tool or criteria for the evaluation of the services offered by the smart city. In this paper, a new Multilayer Fuzzy Inference System (MFIS) is proposed for the assessment of the Planet Factors of smart city (PFSC). The PFSC system is categorized into two levels. The proposed MFIS ba...

متن کامل

Detecting Denial of Service using BENEF Model: An Alternative Approach

Computer security is a seriously concern topic for both computer system and networking. To handle various intrusive actions, an intrusion detection system can be used for detecting and countermeasuring the computer attacks. In this paper, we propose a BENEF model of network-based intrusion detection to detect Denial-of-Service (DoS) attack. This model relies on significant parameters of anomalo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996