Journal article icon

Journal article

Using data-independence in the analysis of intrusion detection systems

Abstract:
In this paper we demonstrate the modelling and analysis of intrusion detection systems and their environment using the process algebra Communicating Sequential Processes and its model checker FDR. We show that this analysis can be used to discover attack strategies that can be used to blind an intrusion detection system, even a hypothetically perfect one that knows all the weaknesses of its protected host. We give an exhaustive analysis of all such attack possibilities. We discuss how to strengthen the intrusion detection systems to prevent these attacks, and finally we show how we can use data independence techniques to verify the corrected versions.
Publication status:
Published
Peer review status:
Peer reviewed

Actions


Access Document


Publisher copy:
10.1016/j.tcs.2005.03.004

Authors


More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author
More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author

Contributors


Publisher:
Elsevier
Journal:
Theoretical Computer Science More from this journal
Volume:
340
Issue:
1
Pages:
82–101
Publication date:
2005-06-01
Edition:
Publisher's version
DOI:
ISSN:
0304-3975


Language:
English
Keywords:
Subjects:
UUID:
uuid:ee2e446d-af6b-4539-8dd4-b43b663d93d7
Local pid:
ora:10765
Deposit date:
2015-03-31

Terms of use



Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP