Towards the automatic generation of mobile agents for distributed intrusion detection system

被引:21
作者
Wang, YX [1 ]
Behera, SR [1 ]
Wong, J [1 ]
Helmer, G [1 ]
Honavar, V [1 ]
Miller, L [1 ]
Lutz, R [1 ]
Slagell, M [1 ]
机构
[1] Iowa State Univ, Dept Comp Sci, Ames, IA 50011 USA
关键词
intrusion detection; software agents; compiler; software fault tree; Colored Petri Net;
D O I
10.1016/j.jss.2004.08.017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Mobile Agent Intrusion Detection System (MAIDS) is an agent based distributed Intrusion Detection System (IDS). A disciplined requirement engineering process is developed to build MAIDS. The starting point is a high level description of intrusions expressed as Software Fault Trees (SFTs). Then the SFTs are translated to Colored Petri Nets (CPNs) that specify the IDS design. Subsequently, the CPNs are implemented as software intrusion detection agents in the MAIDS agent system. By using SFT and CPN as the theoretical underpinnings, the design and implementation of MAIDS can be verified and the design and implementation errors can be substantially reduced. This paper presents a tool that automatically translates CPNs that specify IDS design into software intrusion detection agents in MAIDS. Together with the translator we have developed to convert SFTs that model intrusions into the CPN for IDS design, this tool can automatically generate intrusion detection software agents from a high level description of intrusions. (c) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 14 条
[1]  
CASWELL B, 2003, SNORT OPEN SOURCE NE
[2]  
*CERT COORD CTR, 2003, FTP BOUNC
[3]  
*CERT COORD CTR, 2003, CERT ADV CA 1996 21
[4]  
*CERT COORD CTR, 2003, PROBL FTP PORT COMM
[5]  
DITTRICH D, 2003, DOS PROJECTS TRINOO
[6]   A software fault tree approach to requirements analysis of an intrusion detection system [J].
Helmer G. ;
Wong J. ;
Slagell M. ;
Honavar V. ;
Miller L. ;
Lutz R. .
Requirements Engineering, 2002, 7 (4) :207-220
[7]  
*INF SEC LAB, 2003, MAIDS INTR DET SYST
[8]  
Jensen K., 1992, BASIC CONCEPTS ANAL, V1- 3
[9]   A data mining framework for building intrusion detection models [J].
Lee, W ;
Stolfo, SJ ;
Mok, KW .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :120-132
[10]  
Porras P.A, 1997, P 20 NAT INF SYST SE, V3, P353