BP-IDS:使用业务流程规范在关键基础设施中利用入侵检测

João Lima, Filipe Apolinário, Nelson Escravana, Carlos Ribeiro
{"title":"BP-IDS:使用业务流程规范在关键基础设施中利用入侵检测","authors":"João Lima, Filipe Apolinário, Nelson Escravana, Carlos Ribeiro","doi":"10.1109/ISSREW51248.2020.00029","DOIUrl":null,"url":null,"abstract":"Intrusion detection systems typically suffer from effectiveness problems, of being incapable of detecting new threats, or generating too many false alarms to be of any usefulness. Specification-based intrusion detection systems tackle these problems, exhibiting low false alarm rates and being able to detect new threats, however, they have been seldom used, because they require to completely specify every acceptable action of the monitored system. On the other hand, safety-critical systems would greatly benefit from effective intrusion detection systems, as they are often well specified from a business process point of view, which makes them specially suited for these systems, provided that one translates high-level business process specifications into intrusion detection rules. This paper proposes BP-IDS, a specification-based intrusion detection system that automatically performs this translation. BP-IDS was tested on a critical transportation infrastructure and was able to exhibit good detection results.","PeriodicalId":202247,"journal":{"name":"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"BP-IDS: Using business process specification to leverage intrusion detection in critical infrastructures\",\"authors\":\"João Lima, Filipe Apolinário, Nelson Escravana, Carlos Ribeiro\",\"doi\":\"10.1109/ISSREW51248.2020.00029\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intrusion detection systems typically suffer from effectiveness problems, of being incapable of detecting new threats, or generating too many false alarms to be of any usefulness. Specification-based intrusion detection systems tackle these problems, exhibiting low false alarm rates and being able to detect new threats, however, they have been seldom used, because they require to completely specify every acceptable action of the monitored system. On the other hand, safety-critical systems would greatly benefit from effective intrusion detection systems, as they are often well specified from a business process point of view, which makes them specially suited for these systems, provided that one translates high-level business process specifications into intrusion detection rules. This paper proposes BP-IDS, a specification-based intrusion detection system that automatically performs this translation. BP-IDS was tested on a critical transportation infrastructure and was able to exhibit good detection results.\",\"PeriodicalId\":202247,\"journal\":{\"name\":\"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISSREW51248.2020.00029\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSREW51248.2020.00029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

入侵检测系统通常存在有效性问题,无法检测到新的威胁,或者产生太多无用的假警报。基于规范的入侵检测系统解决了这些问题,表现出较低的误报率,并且能够检测到新的威胁,然而,它们很少被使用,因为它们需要完全指定被监视系统的每个可接受的操作。另一方面,安全关键型系统将极大地受益于有效的入侵检测系统,因为它们通常从业务流程的角度进行了很好的指定,这使得它们特别适合这些系统,只要将高级业务流程规范转换为入侵检测规则。本文提出了一种基于规范的入侵检测系统BP-IDS,该系统可以自动执行这种转换。BP-IDS在一个关键的交通基础设施上进行了测试,并显示出良好的检测结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
BP-IDS: Using business process specification to leverage intrusion detection in critical infrastructures
Intrusion detection systems typically suffer from effectiveness problems, of being incapable of detecting new threats, or generating too many false alarms to be of any usefulness. Specification-based intrusion detection systems tackle these problems, exhibiting low false alarm rates and being able to detect new threats, however, they have been seldom used, because they require to completely specify every acceptable action of the monitored system. On the other hand, safety-critical systems would greatly benefit from effective intrusion detection systems, as they are often well specified from a business process point of view, which makes them specially suited for these systems, provided that one translates high-level business process specifications into intrusion detection rules. This paper proposes BP-IDS, a specification-based intrusion detection system that automatically performs this translation. BP-IDS was tested on a critical transportation infrastructure and was able to exhibit good detection results.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
BP-IDS: Using business process specification to leverage intrusion detection in critical infrastructures Techniques and Tools for Advanced Software Vulnerability Detection Challenges Faced with Application Performance Monitoring (APM) when Migrating to the Cloud AHPCap: A Framework for Automated Hardware Profiling and Capture of Mobile Application States Unit Lemmas for Detecting Requirement and Specification Flaws
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1