2007
DOI: 10.1109/compsac.2007.218
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Aspect-Oriented Intrusion Detection Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2007
2007
2011
2011

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…While the related work seek to add protections (access control, encryption) to the target system or change insecure behavior in the target system (flaw fixing), we focus on monitoring the activities of the target system. In [20], we presented the preliminary overview of an aspect-oriented intrusion detection framework. In this work, the intrusion detection aspects are defined over the sequences of observable states, and the state sequences are matched with the attack signature.…”
Section: Aosd For Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…While the related work seek to add protections (access control, encryption) to the target system or change insecure behavior in the target system (flaw fixing), we focus on monitoring the activities of the target system. In [20], we presented the preliminary overview of an aspect-oriented intrusion detection framework. In this work, the intrusion detection aspects are defined over the sequences of observable states, and the state sequences are matched with the attack signature.…”
Section: Aosd For Securitymentioning
confidence: 99%
“…The parameters in this pointcut are the username, the password, and the login HTTP request, req. We declare a before advice associated with the logining pointcut (Lines [18][19][20]. In this advice, we first retrieve the current attack instance from the attackers map or create a new attack instance (Lines [22][23][24][25][26][27], and then pass the username and the password to the attack signature: the getNewState method (Line 29).…”
Section: Aspect Code For Sql Injection Attackmentioning
confidence: 99%
“…control and encryption using pointcut-based deployment. Other research has proposed even more advanced scenerios where AOSD is applied to address security [4,6,7,9,16,17,20,25,26,28]. However, most existing tools and research focus on the protection of server-side resources.…”
Section: Introductionmentioning
confidence: 99%