Adapting Safety Requirements Analysis to Intrusion Detection

نویسنده

  • Robyn R. Lutz
چکیده

Several requirements analysis techniques widely used in safety-critical systems are being adapted to support the analysis of secure systems. Perhaps the most relevant system safety technique for Intrusion Detection Systems is hazard analysis. Hazard analysis identi es and analyzes hazards (states that can lead to an accident) in terms of their severity of e ects and likelihood of occurrence. As Rushby points out, safety engineering techniques focus on the consequences to be avoided and explicitly consider the system context [9]. Intrusions are one such class of hazards to be avoided, and can only be understood within the context of the operational system (including both legitimate users and attackers). Fault Tree Analysis (FTA) is often used to support the hazard analysis of safety-critical systems [5, 10]. Software Fault Tree Analysis (SFTA), a re nement of FTA, o ers a way to explore intrusion scenarios in support of requirements analysis for Intrusion Detection Systems [3]. SFTA can assist in deriving requirements for the software agents that must identify and respond to intrusions. From experience with safety-critical systems, we can identify four open issues in the application of these analysis techniques to intrusion scenarios:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

متن کامل

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

Barriers to the Use of Intrusion Detection Systems in Safety-Critical Applications

Intrusion detection systems (IDS) provide valuable tools to monitor for, and militate against, the impact of cyber-attacks. However, this paper identifies a range of theoretical and practical concerns when these systems are integrated into safety-critical systems. White-list approaches enumerate the processes that can legitimately exploit system resources and any other access requests are inter...

متن کامل

Adaptive Real-Time Anomaly Detection with Fast Indexing and Ability to Forget

Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Performing anomaly detection in real-time places hard requirements on the algorithms used. First, to deal with the massive data volumes one needs to have efficient data structures and indexing mechanisms. Secondly, the dynam...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001