Generating a Real-Time Constraint Engine for Network Protocols - Information Security Theory and Practice Access content directly
Conference Papers Year : 2019

Generating a Real-Time Constraint Engine for Network Protocols

Abstract

In this paper, we present a practical approach to generate the constraint engine for an effective constraint-based intrusion detection system (IDS). The IDS framework was designed for safety-sensitive networks that involve limited-access closed networks such as the networks for command and control systems or Air Traffic Control (ATC) systems. The constraint engine generated by the framework supports real-time performance while ensuring the intended, normal behaviour of its target networks. We present the IDS framework in terms of its internal DSL representation as well as its transformation mechanisms to generate the constraint engine code. Comparing the autogenerated version against a manually implemented, optimized version of the constraint engine indicates no significant difference in terms of their performance.
Fichier principal
Vignette du fichier
484602_1_En_5_Chapter.pdf (691.89 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-02294615 , version 1 (23-09-2019)

Licence

Attribution

Identifiers

Cite

Mohamed Sami Rakha, Fahim T. Imam, Thomas R. Dean. Generating a Real-Time Constraint Engine for Network Protocols. 12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.44-60, ⟨10.1007/978-3-030-20074-9_5⟩. ⟨hal-02294615⟩
75 View
35 Download

Altmetric

Share

Gmail Facebook X LinkedIn More