scispace - formally typeset
Journal ArticleDOI

Software fault tree and coloured Petri net based specification, design and implementation of agent-based intrusion detection systems

Reads0
Chats0
TLDR
In this paper, the integration of Software Fault Tree (SFT) which describes intrusions and Coloured Petri Nets (CPNs) that specifies design is examined for an Intrusion Detection System (IDS).
Abstract
The integration of Software Fault Tree (SFT), which describes intrusions and Coloured Petri Nets (CPNs) that specifies design, is examined for an Intrusion Detection System (IDS). The IDS under development is a collection of mobile agents that detect, classify, and correlate the system and network activities. SFTs, augmented with nodes that describe trust, temporal and contextual relationships, are used to describe intrusions. CPNs for intrusion detection are built using CPN templates created from the augmented SFTs. Hierarchical CPNs are created to detect critical stages of intrusions. The agentbased implementation of the IDS is then constructed from the CPNs. Examples of intrusions and descriptions of the prototype implementation are used to demonstrate how the CPN approach has been used in the development of the IDS. The main contribution of this paper is an approach to systematic specification, design and implementation of an IDS; Innovations include (1) using stages of intrusions to structure the specification and design of the IDS; (2) augmentation of SFT with trust, temporal and contextual nodes to model intrusions; (3) algorithmic construction of CPNs from augmented SFT; and (4) generation of mobile agents from CPNs.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Safeware: System Safety and Computers

TL;DR: Will Tracz, the esteemed editor and Used-Program salesman, has written an entertaining, non-technical book dealing with the practice (and lack of) of software reuse.
Journal Article

Secrets and Lies: Digital Security in a Networked World

TL;DR: This book writtern contains secrets and lies digital security in a networked world to read, not only check out, yet likewise download them and even check out online.
Journal ArticleDOI

DAG-based attack and defense modeling: don’t miss the forest for the attack trees

TL;DR: This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs), and proposes a taxonomy of the described formalisms.
Posted Content

DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees

TL;DR: In this article, the authors present the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs), allowing for a hierarchical decomposition of complex scenarios into simple, easily understandable and quantifiable actions.
Journal ArticleDOI

Applications of Bayesian networks and Petri nets in safety, reliability, and risk assessments: A review

TL;DR: A review of the applications of Bayesian networks and Petri nets in system safety, reliability and risk assessments is presented, highlighting the potential usefulness of the BN and PN based approaches over other classical approaches, and relative strengths and weaknesses in different practical application scenarios.
References
More filters
Book

Artificial Intelligence: A Modern Approach

TL;DR: In this article, the authors present a comprehensive introduction to the theory and practice of artificial intelligence for modern applications, including game playing, planning and acting, and reinforcement learning with neural networks.
Book ChapterDOI

Fast effective rule induction

TL;DR: This paper evaluates the recently-proposed rule learning algorithm IREP on a large and diverse collection of benchmark problems, and proposes a number of modifications resulting in an algorithm RIPPERk that is very competitive with C4.5 and C 4.5rules with respect to error rates, but much more efficient on large samples.
Proceedings Article

Snort - Lightweight Intrusion Detection for Networks

TL;DR: Snort provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected.
Journal ArticleDOI

An Intrusion-Detection Model

TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Book

Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use

Kurt Jensen
TL;DR: The third volume of a definitive work on coloured Petri nets as discussed by the authors contains a detailed presentation of 19 applications of CP-nets across a broad range of application areas, including a security system, ATM networks, audio/video systems, transaction processing, ISDN services, VLSI chips, document storage, distributed programming, electronic funds transfer, a naval vessel, chemical processing, nuclear waste management, and many more.
Related Papers (5)