TY - GEN
T1 - Formal analysis of intrusion detection systems for high speed networks
AU - Rouached, Mohsen
AU - Sallay, Hassen
AU - Fredj, Ouissem Ben
AU - Ammar, Adel
AU - Al-Shalfan, Khaled
AU - Saad, Majdi Ben
PY - 2010
Y1 - 2010
N2 - Network Intrusion Detection System (NIDS) is an important and practical tool for network security. To guarantee a precise detection, the NIDS must detect packets at a wire speed. However, with the recent trend of high-speed networks, the capability of a single NIDS cannot meet the speed's demand, resulting in rising of false negatives. To address this problem, Specification-based techniques have been proposed as a promising alternative that combine the strengths of misuse and anomaly detection. In this paper, we present an event calculus (EC) based framework towards the formal analysis of NIDS. This framework checks that security requirements and assumptions are preserved at run-time by monitoring the satisfaction of EC formulas that formalize them using the detection rules. This can be done by observing the network at run-time and checking observations against specified network behavior trying to detect deviations from what is specified.
AB - Network Intrusion Detection System (NIDS) is an important and practical tool for network security. To guarantee a precise detection, the NIDS must detect packets at a wire speed. However, with the recent trend of high-speed networks, the capability of a single NIDS cannot meet the speed's demand, resulting in rising of false negatives. To address this problem, Specification-based techniques have been proposed as a promising alternative that combine the strengths of misuse and anomaly detection. In this paper, we present an event calculus (EC) based framework towards the formal analysis of NIDS. This framework checks that security requirements and assumptions are preserved at run-time by monitoring the satisfaction of EC formulas that formalize them using the detection rules. This can be done by observing the network at run-time and checking observations against specified network behavior trying to detect deviations from what is specified.
KW - Event calculus
KW - Formal analysis
KW - Intrusion detection
KW - NIDS
KW - Security requirements
UR - http://www.scopus.com/inward/record.url?scp=79958744382&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79958744382&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:79958744382
SN - 9789604742585
T3 - Advances in E-Activities, Information Security and Privacy - 9th WSEAS Int. Conference on E-Activities, E-ACTIVITIES'10, 9th WSEAS Int. Conference on Information Security and Privacy, ISP'10
SP - 109
EP - 114
BT - Advances in E-Activities, Information Security and Privacy - 9th WSEAS Int. Conference on E-Activities, E-ACTIVITIES'10, 9th WSEAS Int. Conference on Information Security and Privacy, ISP'10
T2 - 9th WSEAS International Conference on E-Activities, E-ACTIVITIES'10, 9th WSEAS International Conference on Information Security and Privacy, ISP'10
Y2 - 14 December 2010 through 16 December 2010
ER -