首页> 外文会议>International Workshop on Formal Aspects in Security and Trust >Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks
【24h】

Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks

机译:关于临时网络动态自动配置协议的基于规范的入侵检测的正式推理

获取原文

摘要

As mobile ad hoc networks (MANETs) are increasingly deployed in critical environments, security becomes a paramount issue. The dynamic and decentralized nature of MANETs makes their protocols very vulnerable to attacks, for example, by malicious insiders, who can cause packets to be misrouted or cause other nodes to have improper configuration. This paper addresses security issues of auto-configuration protocols in ad hoc networks. Auto-configuration protocols enable nodes to obtain configuration information (e.g., an IP address) so that they can communicate with other nodes in the network. We describe a formal approach to modeling and reasoning about auto-configuration protocols to support the detection of malicious insider nodes. With respect to this family of protocols, our approach defines a global security requirement for a network that characterizes the "good" behavior of individual nodes to assure the global property. This behavior becomes local detection rules that define a distributed specification-based intrusion detection system aimed at detecting malicious insider nodes. We formally prove that the local detection rules (identifying activity that is monitored) together with “assumptions” that identify system properties which are not monitored imply the global security requirement. This approach, novel to the field of intrusion detection, can, in principle, yield an intrusion detection system that detects any attack, even unknown attacks, that can imperil the global security requirement.
机译:随着移动临时网络(MANET)越来越多地部署在关键环境中,安全性成为最重要的问题。 MANET的动态和分散性质使其协议非常容易受到攻击,例如,由恶意内部人员攻击,谁可以导致数据包被错误排列或导致其他节点具有不当配置。本文讨论了Ad Hoc网络中的自动配置协议的安全问题。自动配置协议使节点能够获取配置信息(例如,IP地址),以便它们可以与网络中的其他节点通信。我们描述了一种建模和推理关于自动配置协议的正式方法,以支持恶意内幕节点的检测。关于这家族协议,我们的方法为网络定义了一个全球安全要求,该网络是个体节点的“良好”行为,以确保全局属性。此行为成为本地检测规则,其定义了用于检测恶意内幕节点的分布式规范的入侵检测系统。我们正式证明了本地检测规则(识别被监视的活动)与识别未监视的系统属性的“假设”意味着全局安全要求。这种方法,新颖的入侵检测领域,原则上可以产生一种检测到任何攻击,甚至未知攻击的入侵检测系统,这可能会在全球安全要求。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号