Detecting intrusions specified in a software specification language

被引:0
|
作者
Raihan, MF [1 ]
Zulkernine, M [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON K7L 3N6, Canada
来源
Proceedings of the 29th Annual International Computer Software and Applications Conference | 2005年
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools that have gained a considerable amount of popularity. A number of specification-based IDSs have been proposed, where security requirements or attack scenarios are specified using some languages. Currently, attack specification languages are being deployed for describing security requirements. Use of two different languages for software specification and security specification invites a number Of unwanted but complicated issues, such as duplication of requirements specification effort as well as the existence Of redundant and conflicting requirements. In this paper, we present an intrusion detection technique that uses a formal software specification language called Abstract State Machine Language (AsmL) for the specification of security requirements. We present a framework, and develop the algorithm for the IDS that interprets the AsmL attack scenario specifications in order to detect intrusions. Moreover, we discuss case studies where the presented intrusion detection system is used to detect attacks.
引用
收藏
页码:143 / 148
页数:6
相关论文
共 50 条
  • [21] Formalism and Language Tools for Specification of the Semantics of Software Libraries
    Itsykson V.M.
    Automatic Control and Computer Sciences, 2017, 51 (7) : 531 - 538
  • [22] Java']Java as a specification language for hardware-software systems
    Helaihel, R
    Olukotun, K
    1997 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN - DIGEST OF TECHNICAL PAPERS, 1997, : 690 - 697
  • [23] Tool support for Domain Analysis of the Software Specification in Natural Language
    Omori, Yoichi
    Araki, Keijiro
    TENCON 2010: 2010 IEEE REGION 10 CONFERENCE, 2010, : 1065 - 1070
  • [24] Translating Software Requirements from Natural Language to Formal Specification
    Fatwanto, Agung
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND CYBERNETICS (CYBERNETICSCOM), 2012, : 148 - 152
  • [25] An NLP-Based Approach for Detecting Ambiguity of Thai Software Requirements Specification
    Intana, Adisak
    Laosen, Kanjana
    Nuanchan, Panya
    Pattanakit, Nattapong
    Dermchai, Sathani
    2024 21ST INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING, JCSSE 2024, 2024, : 99 - 106
  • [26] Machine Learning with Service Classification for Detecting Control Plane Intrusions in Software Defined Optical Networks
    Wang, Fei
    Zhao, YongLi
    Wang, Wei
    Liu, Dongmei
    Liu, Jun
    Zhang, Shulin
    Ding, Zhengyang
    Jin, Shen
    Zhang, Jie
    23RD OPTO-ELECTRONICS AND COMMUNICATIONS CONFERENCE (OECC2018), 2018,
  • [27] A Comparison of Backscattering, EM, and Power Side-Channels and Their Performance in Detecting Software and Hardware Intrusions
    Luong N. Nguyen
    Chia-Lin Cheng
    Frank T. Werner
    Milos Prvulovic
    Alenka Zajic
    Journal of Hardware and Systems Security, 2020, 4 (2) : 150 - 165
  • [28] Automatic transition of natural language software requirements specification into formal presentation
    Ilieva, MG
    Ormandjieva, O
    NATURAL LANGUAGE PROCESSING AND INFORMATION SYSTEMS, PROCEEDINGS, 2005, 3513 : 392 - 397
  • [29] Process specification and modeling language for service-oriented software development
    Tsai, W. -T.
    Wei, Xiao
    Cao, Zhibin
    Paul, Raymond
    Chen, Yinong
    Xu, Jingjing
    11TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2007, : 181 - +
  • [30] Towards Identification of Software Improvements and Specification Updates By Comparing Monitored and Specified End-User Behavior
    Roehm, Tobias
    Bruegge, Bernd
    Hesse, Tom-Michael
    Paech, Barbara
    2013 29TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE (ICSM), 2013, : 464 - 467