Integrating software specifications into intrusion detection

被引:5
|
作者
Zulkernine, Mohammad [1 ]
Graves, Mathews [1 ]
Khan, Muhammad Umair Ahmed [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON K7L 3N6, Canada
关键词
software specification languages; intrusion detection; attack scenarios; state machines;
D O I
10.1007/s10207-007-0023-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There exist a number of Intrusion Detection Systems (IDSs) that detect computer attacks based on some defined attack scenarios. The attack scenarios or security requirements in some of these IDSs are specified in attack specification languages that are different from software specification languages. The use of two different languages for software specification and attack specification may generate redundant and conflicting requirements. The advantage of using the same language for both functional specifications and attacks specifications is that software designers can address the two different issues without learning two types of languages. We present a method of integrating Abstract State Machine Language (AsmL) and Unified Modeling Language (UML) state charts that are extended finite state machine based software specification languages, with an open source IDS Snort. This work provides AsmL and UML users an IDS that they can use without knowing how to write Snort rules. We automatically translate attack scenarios written in AsmL and UML state charts into Snort rules with context information. The original Snort is modified so that it can use the rules automatically generated by the translator. Adding context information to Snort rules improves the detection capability of Snort. To show the efficacy of the presented approach, we have built a prototype and evaluated it using a number of well-known attack scenarios.
引用
收藏
页码:345 / 357
页数:13
相关论文
共 50 条
  • [1] Integrating software specifications into intrusion detection
    Mohammad Zulkernine
    Mathews Graves
    Muhammad Umair Ahmed Khan
    [J]. International Journal of Information Security, 2007, 6 : 345 - 357
  • [2] Integrating Types and Specifications for Secure Software Development
    Morrisett, Greg
    [J]. COMPUTER NETWORK SECURITY, 2010, 6258 : 32 - 35
  • [3] Integrating Grid with intrusion detection
    Leu, FY
    Lin, JC
    Li, MC
    Yang, CT
    Shih, PC
    [J]. 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 304 - 309
  • [4] Integrating intrusion detection and network management
    Qin, XH
    Lee, W
    Lewis, L
    Cabrera, JBD
    [J]. NOMS 2002: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM: MANAGEMENT SOLUTIONS FOR THE NEW COMMUNICATIONS WORLD, 2002, : 329 - 344
  • [5] An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection
    Liu, Jiannan
    Xiao, Kun
    Luo, Lei
    Li, Yun
    Chen, Lirong
    [J]. 2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS 2020), 2020, : 122 - 129
  • [6] Logic induction of valid behavior specifications for intrusion detection
    Ko, C
    [J]. 2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 142 - 153
  • [7] Integrating Software Engineering Processes in the Development of Efficient Intrusion Detection Systems in Wireless Sensor Networks
    Almomani, Iman
    Alromi, Afnan
    [J]. SENSORS, 2020, 20 (05)
  • [8] The best of both worlds integrating UML with Z for software specifications
    Martin, S
    [J]. COMPUTING & CONTROL ENGINEERING JOURNAL, 2003, 14 (01): : 8 - 11
  • [9] From Intrusion Detection to Software Design
    Etalle, Sandro
    [J]. COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 1 - 10
  • [10] Detection of Malicious Software Engineer Intrusion
    Shin, Michael E.
    Patel, Nipul
    Sethia, Snehadeep
    [J]. 22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING & KNOWLEDGE ENGINEERING (SEKE 2010), 2010, : 565 - 570