2011
DOI: 10.1007/978-3-642-18378-2_11
|View full text |Cite
|
Sign up to set email alerts
|

Using Constraints for Intrusion Detection: The NeMODe System

Abstract: Abstract. In this work we present NeMODe a declarative system for Computer Network Intrusion detection which provides a declarative Domain Specific Language for describing computer network intrusion signatures that could spread across several network packets, which allows to state constraints over network packets, describing relations between several packets, and providing several back-end detection mechanisms which relies on Constraint Programming (CP) methodologies to find those intrusions.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…In contrast, our approach allows defining the partial-order patterns on the required set of packets without the need to specify any time window. In a related effort of using a DSL to express network constraints, Salgueiro et al [19] present a DSL to describe common attacks on TCP/IP protocols that can generate solution code. However, the DSL was not designed to handle the kind of multi-packet constraints that we needed for the DDS networks.…”
Section: Results and Evaluationmentioning
confidence: 99%
“…In contrast, our approach allows defining the partial-order patterns on the required set of packets without the need to specify any time window. In a related effort of using a DSL to express network constraints, Salgueiro et al [19] present a DSL to describe common attacks on TCP/IP protocols that can generate solution code. However, the DSL was not designed to handle the kind of multi-packet constraints that we needed for the DDS networks.…”
Section: Results and Evaluationmentioning
confidence: 99%
“…Since these languages do not use a declarative approach, thus making them less expressive. In literature, the NeMODe system [6] is an example of network intrusion detection systems that provides a declarative and expressive domain specific language for describing intrusion signatures that could spread across network packets. Simply stating constraints over network packets in the script, the desired intrusions will be recognized by Constraint Programming paradigm used as the backend detection mechanism.…”
Section: Domain Specific Language (Dsl)mentioning
confidence: 99%
“…Exploit languages [21,10] are used to describe how an attack is performed and the stages of the attack. Knowledge languages [16,8] have a global expertise of described attacks and know the implications of a single event.…”
Section: Introductionmentioning
confidence: 99%
“…Detection languages [17,20] describe the detection of an attack according to a number of occurrences of events. Response languages [21,12] describe how to react when an attack is detected.…”
Section: Introductionmentioning
confidence: 99%