Formal specification for fast automatic IDS training

Antonio Durante, Roberto Di Pietro, Luigi V. Mancini

Research output: Contribution to journalArticlepeer-review

9 Scopus citations

Abstract

This paper illustrates a methodology for the synthesis of the behavior of an application program in terms of the set of system calls invoked by the program. The methodology is completely automated, with the exception of the description of the high level specification of the application program, which is demanded to the system analyst. The technology employed (VSP/CVS) for such synthesis minimizes the efforts required to code the specification of the application. The methodology is completely independent from the intrusion detection tool adopted, and appears suitable to derive the expected behavior of a secure WEB server that can effectively support the increasing request of security that affects the e-commerce. As a case study, the methodology is applied to the Post Office Protocol, the ipop3d daemon. © Springer-Verlag Berlin Heidelberg 2003.
Original languageEnglish (US)
Pages (from-to)191-204
Number of pages14
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2629
DOIs
StatePublished - Jan 1 2003
Externally publishedYes

Fingerprint

Dive into the research topics of 'Formal specification for fast automatic IDS training'. Together they form a unique fingerprint.

Cite this