A software fault tree approach to requirements analysis of an intrusion detection system

被引:43
作者
Helmer G. [1 ,2 ]
Wong J. [1 ]
Slagell M. [1 ]
Honavar V. [1 ]
Miller L. [1 ]
Lutz R. [1 ]
机构
[1] Department of Computer Science, Iowa State University, Ames, IA
[2] Department of Computer Science, 226 Atanasoff Hall, Iowa State University, Ames
关键词
Coloured Petri nets; Intrusion detection system; Mobile agents; Requirements analysis; Software fault tree;
D O I
10.1007/s007660200016
中图分类号
学科分类号
摘要
Requirements analysis for an intrusion detection system (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collection of mobile agents that detect, classify, and correlate system and network activities, the derived requirements include what activities the agent software should monitor, what intrusion characteristics the agents should correlate, where the IDS agents should be placed to feasibly detect the intrusions, and what counter-measures the software should initiate. This paper describes the use of software fault trees for requirements identification and analysis in an IDS. Intrusions are divided into seven stages (following Ruiu), and a fault subtree is developed to model each of the seven stages (reconnaissance, penetration, etc.). Two examples are provided. This approach was found to support requirements evolution (as new intrusions were identified), incremental development of the IDS, and prioritisation of countermeasures. © 2002 Springer-Verlag London Limited.
引用
收藏
页码:207 / 220
页数:13
相关论文
共 29 条
[1]  
Amoroso E., Intrusion Detection: Intrusion, (1999)
[2]  
Helmer G., Wong J.S.K., Honavar V., Miller L., Intelligent agents for intrusion detection, Proceedings, IEEE Information Technology Conference, pp. 121-124, (1998)
[3]  
An Introduction to Software Agents, (1997)
[4]  
Leveson N.G., Safeware: System Safety and Computers, (1995)
[5]  
De Lemos R., Saeed A., Anderson T., Analyzing safety requirements for process-control systems, IEEE Software, 12, 3, pp. 42-53, (1995)
[6]  
Lutz R., Woodhouse R.M., Requirements analysis using forward and backward search, Ann Software Eng, 3, pp. 459-475, (1997)
[7]  
Hansen K.M., Ravn A.P., Stavridou V., From safety analysis to software requirements, IEEE Trans Software Eng, 24, 7, pp. 573-584, (1998)
[8]  
Amoroso E., Fundamentals of Computer Security Technology, (1994)
[9]  
Leveson N.G., Cha S.S., Shimeall T.J., Safety verification of Ada programs using software fault trees, IEEE Software, 8, 4, pp. 48-59, (1991)
[10]  
Lutz R.R., Targeting safety-related errors during software requirements analysis, J Syst Software, 34, pp. 223-230, (1996)