2010 10th International Conference on Application of Concurrency to System Design 2010
DOI: 10.1109/acsd.2010.32
|View full text |Cite
|
Sign up to set email alerts
|

Adaptable Intrusion Detection Systems Dedicated to Concurrent Programs: A Petri Net-Based Approach

Abstract: Intrusion detection systems (IDS) are one way to tackle the increasing number of attacks that exploit software vulnerabilities. However, the construction of such a security system is a delicate process involving: (i) the acquisition of the monitored program behavior and its storage in a compact way, (ii) the generation of a monitor detecting deviances in the program behavior. These problems are emphasized when dealing with complex or parallel programs.This paper presents a new approach to automatically generat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…The advantage of Petri nets is that, due to their better representation of concurrent processes and resources, they can be orders of magnitude smaller than their equivalent automata. For instance, [300] managed to simulate the state of several multi-threaded programs to perform intrusion detection. Simulation was performed onthe-fly during the program execution by wrapping system calls, and thus required an efficient representation and computation time.…”
Section: Reachability Graphmentioning
confidence: 99%
“…The advantage of Petri nets is that, due to their better representation of concurrent processes and resources, they can be orders of magnitude smaller than their equivalent automata. For instance, [300] managed to simulate the state of several multi-threaded programs to perform intrusion detection. Simulation was performed onthe-fly during the program execution by wrapping system calls, and thus required an efficient representation and computation time.…”
Section: Reachability Graphmentioning
confidence: 99%
“…The attacking clients behave according to specification, the data rate of the attack is low, and -in case of a highly distributed attack -each client only opens a small amount of connections. This leads to intrusion detection systems not being able to successfully distinguish attacks from regular server traffic [13]. Currently, many servers such as Apache can be configured to mitigate the effect of slow HTTP attacks by reducing the maximum time a server waits to receive a full request.…”
Section: Identification Schemesmentioning
confidence: 99%
“…Dolgikh et al used CPN as the backbone of the proposed approach to define the functionality of interest as behavior signatures and to serve as the mechanism for the signature detection in IDS [13]. With Petri nets, Voron et al [14] described a formal reference behavior model of the proposed novel approach that automatically generates host-based IDS from program sources. Balaz et al [15] proposed a new IDS architecture based on partially ordered events and a novel detection method that matches the intrusion signature with Petri nets.…”
Section: Related Workmentioning
confidence: 99%