[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1854099.1854145acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

A DSL for intrusion detection based on constraint programming

Published: 07 September 2010 Publication History

Abstract

Intrusion Detection Systems (IDS) are increasingly important in computer networks, allowing the early diagnosis and detection of anomalous situations, which could otherwise put network performance at risk or even compromise the security or integrity of user data.
In this work we present NeMODe, a domain specific language for network intrusion detection that allows to describe network intrusions that spread across several network packets, relying on Constraint Programming(CP), a programming methodology that starts with a declarative description of the desirable network situations and, based on that description, a set of parameterizations for network intrusion detection mechanisms will execute to find those intrusions.

References

[1]
tcpdump web page at http://www.tcpdump.org/,April, 2009.
[2]
S. Abreu, D. Diaz, and P. Codognet. Parallel local search for solving constraint problems on the cell broadband engine (preliminary results). CoRR, abs/0910.1264, 2009.
[3]
K. Arun. Flow-aware cross packet inspection using bloom filters for high speed data-path content matching pages 230--1234, march 2009.
[4]
W. Barth. Nagios: System and network monitoring. No Starch Press San Francisco, CA, USA, 2006.
[5]
J. Beale. Snort 2.1 Intrusion Detection, Second Edition. Syngress Publishing, 2004.
[6]
P. Codognet and D. Diaz. Yet another local search method for constraint solving. Lecture Notes in Computer Science, 2264:73--90, 2001.
[7]
D. Comer. Internetworking With TCP/IP Volume 1: Principles Protocols, and Architecture, 5th edition. Prentice Hall, 2006.
[8]
J. Kahle, M. Day, H. Hofstee, C. Johns, T. Maeurer, and D. Shippy. Introduction to the Cell multiprocessor. IBM journal of Research and Development, 49(4/5):589--604, 2005.
[9]
A. Kiezun, V. Ganesh, P. Guo, P. Hooimeijer, and M. Ernst. HAMPI: A solver for string constraints. In Proceedings of the eighteenth international symposium on Software testing and analysis, pages 105--116. ACM, 2009.
[10]
S. Kumar and E. Spafford. A software architecture to support misuse intrusion detection. In Proceedings of the 18th national information security conference, pages 194--204, 1995.
[11]
M. Roesch. Snort - lightweight intrusion detection for networks. In LISA '99: Proceedings of the 13th USENIX conference on System administration, pages 229--238, Berkeley, CA, USA, 1999. USENIX Association.
[12]
F. Rossi, P. Van Beek, and T. Walsh. Handbook of constraint programming. Elsevier Science, 2006.
[13]
C. Schulte and P. Stuckey. Speeding up constraint propagation. Lecture Notes in Computer Science, 3258:619--633, 2004.
[14]
H. Song and J. Lockwood. Efficient packet classification for network intrusion detection using FPGA. In Proceedings of the 2005 ACM/SIGDA 13th international symposium on Field-programmable gate arrays, pages 238--245. ACM New York, NY, USA, 2005.
[15]
G. Team. Gecode: Generic constraint development environment, 2008. Available from http://www.gecode.org.
[16]
A. Van Deursen and J. Visser. Domain-specific languages: An annotated bibliography. ACM Sigplan Notices, 35(6):26--36, 2000.
[17]
P. Van Hentenryck and L. Michel. Constraint-based local search. MIT Press, 2005.
[18]
G. Vasiliadis, M. Polychronakis, S. Antonatos, E. P. Markatos, and S. Ioannidis. Regular expression matching on graphics hardware for intrusion detection. In RAID '09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, pages 265--283, Berlin, Heidelberg, 2009. Springer-Verlag.
[19]
Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, page 283. ACM, 2000.

Cited By

View all
  • (2023)A model-based mode-switching framework based on security vulnerability scoresJournal of Systems and Software10.1016/j.jss.2023.111633200:COnline publication date: 1-Jun-2023
  • (2019)DOORchain: Deep Ontology-Based Operation Research to Detect Malicious Smart ContractsNew Knowledge in Information Systems and Technologies10.1007/978-3-030-16181-1_51(538-545)Online publication date: 27-Mar-2019
  • (2018)Modelling distributed network attacks with constraintsInternational Journal of Bio-Inspired Computation10.1504/IJBIC.2013.0554495:4(210-225)Online publication date: 21-Dec-2018

Index Terms

  1. A DSL for intrusion detection based on constraint programming

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      SIN '10: Proceedings of the 3rd international conference on Security of information and networks
      September 2010
      286 pages
      ISBN:9781450302340
      DOI:10.1145/1854099
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      • Microsoft: Microsoft
      • RFBR: Russian Foundation for Basic Research

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 September 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. constraint programming
      2. domain-specific languages
      3. intrusion detection systems

      Qualifiers

      • Research-article

      Conference

      SIN '10
      Sponsor:
      • Microsoft
      • RFBR
      SIN '10: 3rd International Conference of Security of Information and Networks
      September 7 - 11, 2010
      Rostov-on-Don, Taganrog, Russian Federation

      Acceptance Rates

      Overall Acceptance Rate 102 of 289 submissions, 35%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 14 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)A model-based mode-switching framework based on security vulnerability scoresJournal of Systems and Software10.1016/j.jss.2023.111633200:COnline publication date: 1-Jun-2023
      • (2019)DOORchain: Deep Ontology-Based Operation Research to Detect Malicious Smart ContractsNew Knowledge in Information Systems and Technologies10.1007/978-3-030-16181-1_51(538-545)Online publication date: 27-Mar-2019
      • (2018)Modelling distributed network attacks with constraintsInternational Journal of Bio-Inspired Computation10.1504/IJBIC.2013.0554495:4(210-225)Online publication date: 21-Dec-2018

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media