Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
نویسندگان
چکیده
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control requirements and more recently on authentication and usage control requirements. Specifying administration and delegation policies is also an important issue, especially in the context of pervasive distributed systems. In this paper, we are investigating the new issue of modelling intrusion detection and reaction policies and study the appropriateness of using deontic logic for this purpose. We analyze how intrusion detection requirements may be specified to face known intrusions but also new intrusions. In the case of new intrusions, we suggest using the bring it about modality and specifying requirements as prohibitions to bring it about that some security objectives are violated. When some intrusions occur, the security policy to be complete should specify what happens in this case. This is what we call a reaction policy. The paper shows that this part of the policy corresponds to contrary to duty requirements and suggests an approach based on assigning priority to activation contexts of security requirements.
منابع مشابه
Designing an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic
One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...
متن کاملSocial Commitment Policies for Formally Specifying the Organisation and Behaviour of Open Agent Societies1
In this paper, a new domain-based organisational model is proposed as an extension of the traditional role-based models for formal agent society specification. The concept of social commitment policies, which govern various aspects of group behaviour, including penalties for individual acts in the context of group activities, is at the heart of this model. The concept of penalty is presented as...
متن کاملDeontic Logic for Specifying Normative Behaviour of Intelligent Agents
A brief review of deontic logic and its application to model normative behaviour are discussed. When the norms of an organisation are identified, it will be possible to predict and hence to collaborate with others in performing co-ordinated actions. As the norms are understood, captured and represented in the form of deontic logic, it will serve as a basis for programming intelligent agents to ...
متن کاملSpecifying Policies Using UML Interactions – An Evaluation Based on a Case Study
This report provides a case study based evaluation of UML sequence diagrams as a notation for policy specification. Policy rules are defined on the basis of deontic logic, and we provide these with a trace based semantics interpreted over Kripke structures. This gives a semantics along the line of the UML trace semantics for sequence diagrams, which is utilized in the evaluation. The focus is o...
متن کاملIntegrated Access Control and Intrusion Detection (IACID) Framework for Secure Grid Computing
Traditional Intrusion Detection Systems (IDSs) work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between these components prevents detecting sophisticated attacks and responding to ongoing attacks in real time, before they cause damage. Another disadvantage is a large number of false positives. Reports of attacks c...
متن کامل