作者: Jim Alves-Foss , Karl Levitt , Calvin Ko , Cui Zhang , Tao Song
DOI:
关键词: Computer science 、 Soundness 、 Hierarchical database model 、 Intrusion detection system 、 Anomaly-based intrusion detection system 、 Misuse detection 、 ACL2 、 Anomaly detection 、 Security policy 、 Computer security
摘要: Intrusion detection is considered to be an effective technique detect attacks that violate the security policy of systems. There are basically three different kinds intrusion detection: Anomaly detection, misuse and specification-based [MB02]. Specification-based differs from others by describing desired functionalities security-critical entities including system programs, protocols, networks, application programs [CK97]. This means unknown will detected as well known attacks. open question which kind can a specific system. In this paper hierarchical model built reason specifications for requirements. A formal framework with ACL2 analyze improve rules systems [KM00]. SHIM (System Health Monitoring) used example show validation our [CK01]. We formalize all trusted file we about soundness completeness proving satisfy various assumptions. These assumptions properties not checked Analysis these shows role in improving