Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
DOI: 10.1109/secpri.1997.601332
|View full text |Cite
|
Sign up to set email alerts
|

Execution monitoring of security-critical programs in distributed systems: a specification-based approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
134
0
3

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 211 publications
(137 citation statements)
references
References 7 publications
0
134
0
3
Order By: Relevance
“…Anomaly-based approaches [1,5,10] that attacks involve some abnormal behaviour of the system that is being monitored. Intrusions are, thus, detected as deviations from the expected normal behaviour of the system.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Anomaly-based approaches [1,5,10] that attacks involve some abnormal behaviour of the system that is being monitored. Intrusions are, thus, detected as deviations from the expected normal behaviour of the system.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, since threats are detected as deviations from a model of normal behaviour (that is expressed by the rules which are specified in S&D patterns and are being monitored), our approach can also be classified as model or specification-based [1,10]. Finally, we should note that our approach has some similarity with statistical approaches to intrusion detection based on Bayesian networks (e.g.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Anomaly detection models the normal behaviors of the subjects being monitored and identifies anything that significantly deviates from the normal behaviors as attacks. Many techniques have been proposed for anomaly detection, including statistical approaches (e.g., Haystack [36], NIDES/STAT [15]), machine learning approaches (e.g., TIM [37], IBL [20]), computer immunological approaches [7], [8], [39], and specification based approaches [17], [18], [35], [38]. Misuse detection models the patterns of known attacks or vulnerabilities, and identifies actions that conform to such patterns as attacks.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…Ilgun et al [10] propose the use of finite state transition diagrams to specify sequences of actions that would lead the system from a secure initial state to a compromised final state. Ko et al [11] introduce a new class of grammars, called parallel environment grammars that are specifically suitable for specifying behavior (traces) of concurrent processes. The expected behavior of security critical programs is specified by a grammar, and an alarm is raised if the observed execution trace is not in the language defined by the grammar.…”
Section: Background and Motivationmentioning
confidence: 99%