1992
DOI: 10.1007/bfb0013912
|View full text |Cite
|
Sign up to set email alerts
|

ASAX: Software architecture and rule-based language for universal audit trail analysis

Abstract: After a brief survey of the problems related to audit trail analysis and of some approaches to deal with them, the paper outlines the project ASAX which aims at providing an advanced tool to support such analysis. One key feature of ASAX is its elegant architecture build on top of a universal analysis tool allowing any audit trail to be analysed after a straight format adaptation. Another key feature of the project ASAX is the language RUSSEL used to express queries on audit trails. RUSSEL is a rulebased langu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
28
0

Year Published

2001
2001
2007
2007

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(29 citation statements)
references
References 3 publications
1
28
0
Order By: Relevance
“…Among these are the methods based on rule-based expert systems (Sebring et al,1988;Garvey and Lunt, 1991;Habra et al, 1992;Pouzol and Ducasse, 2002) and attack graphbased approaches (Kumar and Spa ord, 1994;Kumar, 1995;Staniford-Chen et al, 1996;Lin, Wang and Jajodia, 1998;Sheyner et al, 2002). Several works have focused on languages for specifying attack signatures (Michel and Me, 2001;Kruegel and Toth, 2002;Totel, Vivinis and Me, 2004;Raihan and Zulkernine, 2005) and state-transition analysis of anomalous system behaviour (Ilgun,1993;Ilgun, Kemmerer and Porras, 1995;d'Auriol and Surapaneni, 2004).…”
Section: Related Modelsmentioning
confidence: 99%
“…Among these are the methods based on rule-based expert systems (Sebring et al,1988;Garvey and Lunt, 1991;Habra et al, 1992;Pouzol and Ducasse, 2002) and attack graphbased approaches (Kumar and Spa ord, 1994;Kumar, 1995;Staniford-Chen et al, 1996;Lin, Wang and Jajodia, 1998;Sheyner et al, 2002). Several works have focused on languages for specifying attack signatures (Michel and Me, 2001;Kruegel and Toth, 2002;Totel, Vivinis and Me, 2004;Raihan and Zulkernine, 2005) and state-transition analysis of anomalous system behaviour (Ilgun,1993;Ilgun, Kemmerer and Porras, 1995;d'Auriol and Surapaneni, 2004).…”
Section: Related Modelsmentioning
confidence: 99%
“…al. (1988)], Haystack Laboratories' HAYSTACK System [Smaha (1988)], Los Alamos National Laboratory's Wisdom & Sense (W&S) [Liepins & Vaccaro (1989)], AT&T's COMPUTERWATCH [Dowell & Ramstedt (1990)] and ASAX [Habra et. al.…”
Section: Prior Researchmentioning
confidence: 99%
“…The ASAX (Advanced Security and Audit Trail Analysis on UniX) project [11] uses a rule-based language called RUSSEL (Rule Based Sequence Evaluation Language), which provides a combination of procedural and rule-based programming to reason about activity on Unix systems by analyzing audit trails.…”
Section: P-best (Production-based Expert Systemmentioning
confidence: 99%