A model of the behavior of network objects in distributed computer systems

被引:1
|
作者
Gamayunov, D. Yu. [1 ]
Smelyanskii, R. L. [1 ]
机构
[1] Moscow MV Lomonosov State Univ, Fac Comp Math & Cybernet, Moscow 119992, Russia
关键词
Intrusion Detection; Active Object; Safe State; Attack Detection; Attack Pattern;
D O I
10.1134/S0361768807040020
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A model designed for the analysis of intrusion detection methods is described. The model also helps validate such methods and estimate their complexity. In terms of this model, a new intrusion detection method is proposed, its validity is proved, and its computational complexity is evaluated. It differs from the available expert-based methods in that it does not impose constraints on the behavior being detected and makes it possible to detect unknown or modified attacks.
引用
收藏
页码:195 / 203
页数:9
相关论文
共 50 条
  • [1] A model of the behavior of network objects in distributed computer systems
    D. Yu. Gamayunov
    R. L. Smelyanskii
    [J]. Programming and Computer Software, 2007, 33 : 195 - 203
  • [2] Markov Model of Normal Conduct Template of Computer Systems Network Objects
    Tereikovskiy, Ihor
    Parkhomenko, Ivan
    Toliupa, Serhii
    Tereikovska, Liudmyla
    [J]. 2018 14TH INTERNATIONAL CONFERENCE ON ADVANCED TRENDS IN RADIOELECTRONICS, TELECOMMUNICATIONS AND COMPUTER ENGINEERING (TCSET), 2018, : 498 - 501
  • [3] Analytical model of distributed computer network
    Hanuliak, I
    [J]. COMPUTERS AND ARTIFICIAL INTELLIGENCE, 2000, 19 (05): : 457 - 474
  • [4] Mobile agent model for distributed objects systems
    Komiya, T
    Ohsida, H
    Takizawa, M
    [J]. ISORC 2002: FIFTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2002, : 62 - 69
  • [5] A Similarity Network based Behavior Anomaly Detection Model for Computer Systems
    Shen, Qijun
    Cao, Jian
    Gu, Hua
    [J]. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1738 - 1745
  • [6] SEIQRS model for the transmission of malicious objects in computer network
    Mishra, Bimal Kumar
    Jha, Navnit
    [J]. APPLIED MATHEMATICAL MODELLING, 2010, 34 (03) : 710 - 715
  • [7] Mobile agent model for manipulating distributed objects systems
    Komiya, T
    Ohsida, H
    Takiza, M
    [J]. PROCEEDINGS OF THE 6TH JOINT CONFERENCE ON INFORMATION SCIENCES, 2002, : 1056 - 1063
  • [8] Observable behavior of distributed systems: Component reasoning for concurrent objects
    Din, Crystal Chang
    Dovland, Johan
    Johnsen, Einar Broch
    Owe, Olaf
    [J]. JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2012, 81 (03): : 227 - 256
  • [9] OBJECTS FOR DISTRIBUTED SYSTEMS
    JAZAYERI, M
    [J]. SIGPLAN NOTICES, 1989, 24 (04): : 117 - 119
  • [10] Network behavior analysis based on a computer network model
    Han, WL
    Shuai, D
    Liu, YJ
    [J]. GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 418 - 421