Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001.
DOI: 10.1109/csfw.2001.930148
|View full text |Cite
|
Sign up to set email alerts
|

Log auditing through model-checking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
79
0

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 65 publications
(80 citation statements)
references
References 6 publications
1
79
0
Order By: Relevance
“…Roger and Goubault-Larreq [26] have used linear temporal logic and associated model-checking algorithms for log auditing. The work is related although their application is quite different.…”
Section: Resultsmentioning
confidence: 99%
“…Roger and Goubault-Larreq [26] have used linear temporal logic and associated model-checking algorithms for log auditing. The work is related although their application is quite different.…”
Section: Resultsmentioning
confidence: 99%
“…In contrast to other such temporal logic based approaches [16], we use an expressively rich logic in which one can express both signature based and simple anamoly based attack specifications. We automatically monitor such attack specifications with respect to the system execution.…”
Section: Resultsmentioning
confidence: 99%
“…Roger et al in [16] used temporal logic and model-checking based approach to detect intrusion. This work is closely related to ours; however, unlike [16] we can express more sophisticated signatures involving statistics and real-time by using powerful monitoring logic Eagle.…”
Section: Background and Motivationmentioning
confidence: 99%
See 2 more Smart Citations