2010 IEEE International Conference on Information Theory and Information Security 2010
DOI: 10.1109/icitis.2010.5689549
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection based on model checking timed interval temporal logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 8 publications
(21 citation statements)
references
References 4 publications
0
13
0
Order By: Relevance
“…Compared with linear temporal logic, RASL has been additionally equipped with interval semantics. So, a phase, that is, a sequence of atomic actions, in an attack can be described with an interval in a RASL formula, while various steps in the phase can be described with various points in the interval [2]. Temporal relationship between steps in an attack can be described with temporal operators.…”
Section: Construct Signatures With Rasl Formulasmentioning
confidence: 99%
See 3 more Smart Citations
“…Compared with linear temporal logic, RASL has been additionally equipped with interval semantics. So, a phase, that is, a sequence of atomic actions, in an attack can be described with an interval in a RASL formula, while various steps in the phase can be described with various points in the interval [2]. Temporal relationship between steps in an attack can be described with temporal operators.…”
Section: Construct Signatures With Rasl Formulasmentioning
confidence: 99%
“…However, these papers do not mention how to detect these attacks automatically. The method presented in [2] can do it automatically, but it can only find concurrent attacks rather than real-time attacks.…”
Section: Detect Various Attack Types Using Model Checking Interval Tementioning
confidence: 99%
See 2 more Smart Citations
“…Time and attribute-relative features were utilized to lead the mining process, and strict attribute schemes were used to prune sequential rules. Weijun Zhu et al, in [27], applied Interval temporal logic (ITL) model which reduces the false negative rate of misuse detection for concurrent attacks. Milanesi, G. et al [28], proposed a novel system for indoor video surveillance.…”
Section: Related Workmentioning
confidence: 99%