2007
DOI: 10.1504/ijics.2007.012246
|View full text |Cite
|
Sign up to set email alerts
|

Software fault tree and coloured Petri net based specification, design and implementation of agent-based intrusion detection systems

Abstract: Abstract:The integration of Software Fault Tree (SFT), which describes intrusions and Coloured Petri Nets (CPNs) that specifies design, is examined for an Intrusion Detection System (IDS). The IDS under development is a collection of mobile agents that detect, classify, and correlate the system and network activities. SFTs, augmented with nodes that describe trust, temporal and contextual relationships, are used to describe intrusions. CPNs for intrusion detection are built using CPN templates created from the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
17
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(17 citation statements)
references
References 45 publications
0
17
0
Order By: Relevance
“…We start the FTTD analysis by identifying the time interval, when the hazard can occur using formula (4). More information about it is given in [10].…”
Section: Fttd Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…We start the FTTD analysis by identifying the time interval, when the hazard can occur using formula (4). More information about it is given in [10].…”
Section: Fttd Analysismentioning
confidence: 99%
“…Intrusion detection systems (IDS) base their operation on the built-in patterns of various attack strategies. Aforementioned strategies can be represented by different means like: augmented goal-tree [6], attack trees [17] (originated from on fault trees), attack graphs [14], or augmented software fault trees [4]. In augmented goal tree representation [6], the attack is expressed by sequences of logically related steps.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, intrusion prevention has aroused extensive attention as a system of not only is able to identify an invasion but also respond to the invasion. In order to improve the intelligence level of intrusion detection system, plan recognition has a number of successful applications in the intrusion detection system, and has played an important role in improve the performance of the system [1][2][3][4][5].Planning knowledge graph [6,7] has the features of is simple to understand, easy to implement as a new planning knowledge model, and can predict the next actions, so it has important significance for intrusion prevention. The same time the planning knowledge graph and HTN intelligent planning are almost entirely similar in planning knowledge storage and inference mechanism, so which is very beneficial to knowledge sharing of intelligent planning and plan recognition.…”
Section: Introductionmentioning
confidence: 99%
“…Petri nets and Colored Petri nets have, however, been used extensively in the design and implementation of intrusion detection systems such as those by Kumar and Spafford [18] and Helmer et al [12] along with related formalisms based on timed finite state machines such as the approach proposed by Chang et al [6], which may be considered as complementary to the approach described in this paper.…”
Section: Related Workmentioning
confidence: 99%