...
首页> 外文期刊>Theoretical computer science >Using data-independence in the analysis of intrusion detection systems
【24h】

Using data-independence in the analysis of intrusion detection systems

机译:在入侵检测系统分析中使用数据独立性

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

In this paper we demonstrate the modelling and analysis of intrusion detection systems and their environment using the process algebra Communicating Sequential Processes and its model checker FDR. We show that this analysis can be used to discover attack strategies that can be used to blind an intrusion detection system, even a hypothetically perfect one that knows all the weaknesses of its protected host. We give an exhaustive analysis of all such attack possibilities. We discuss how to strengthen the intrusion detection systems to prevent these attacks, and finally we show how we can use data independence techniques to verify the corrected versions. (c) 2005 Elsevier B.V. All rights reserved.
机译:在本文中,我们使用过程代数通信顺序过程及其模型检查器FDR演示了入侵检测系统及其环境的建模和分析。我们表明,这种分析可用于发现可用于使入侵检测系统蒙蔽的攻击策略,甚至是一个了解其受保护主机的所有弱点的假设完美系统。我们对所有此类攻击可能性进行了详尽的分析。我们讨论了如何加强入侵检测系统以防止这些攻击,最后我们展示了如何使用数据独立性技术来验证更正的版本。 (c)2005 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号