Journal article
Using data-independence in the analysis of intrusion detection systems
- Abstract:
- In this paper we demonstrate the modelling and analysis of intrusion detection systems and their environment using the process algebra Communicating Sequential Processes and its model checker FDR. We show that this analysis can be used to discover attack strategies that can be used to blind an intrusion detection system, even a hypothetically perfect one that knows all the weaknesses of its protected host. We give an exhaustive analysis of all such attack possibilities. We discuss how to strengthen the intrusion detection systems to prevent these attacks, and finally we show how we can use data independence techniques to verify the corrected versions.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Version of record, pdf, 229.9KB, Terms of use)
-
- Publisher copy:
- 10.1016/j.tcs.2005.03.004
- Publisher:
- Elsevier
- Journal:
- Theoretical Computer Science More from this journal
- Volume:
- 340
- Issue:
- 1
- Pages:
- 82–101
- Publication date:
- 2005-06-01
- Edition:
- Publisher's version
- DOI:
- ISSN:
-
0304-3975
- Language:
-
English
- Keywords:
- Subjects:
- UUID:
-
uuid:ee2e446d-af6b-4539-8dd4-b43b663d93d7
- Local pid:
-
ora:10765
- Deposit date:
-
2015-03-31
Terms of use
- Copyright holder:
- Elsevier BV
- Copyright date:
- 2005
- Notes:
- Copyright 2005 Elsevier B.V. All rights reserved. Re-use of this article is permitted in accordance with the Terms and Conditions set out at http://www.elsevier.com/open-access/userlicense/1.0/
- Licence:
- Other
If you are the owner of this record, you can report an update to it here: Report update to this record