Abstract
This paper describes a laboratory for exploring inference detection and analysis techniques.* This laboratory is called ILIAD (Integrated Laboratory for Inference Analysis and Detection). It has been implemented at the University of Alabama in Huntsville as part of our AERIE inference research project. The paper describes the overall architecture of the laboratory and then describes the major components: a database generation tool called Genie and an inference analysis tool called Wizard. Genie is used to generate test databases that can be analyzed by Wizard. The basis for Genie’s database generation function is a simulator that provides the coherence necessary for the database to include actual inferences. Genie also supports a fact generation language called FGL, which pemtits the user to define a large database with only a relatively small number of FGL statements. The Wizard tool operates on data descriptions called facets, which encode the results of an inference-directed microanalysis of a database. Wizard can detect second-path inference channels within a single facet as well as inference channels that span multiple facets. The paper concludes with some observations from our initial use of ILIAD.
Chapter PDF
Similar content being viewed by others
References
Leonard J. Binns. Inference Through Secondary Path Analysis. In Proceedings of the Sixth IFIP 11.3 Working Conference on Database Security. IFIP, August 1992.
Leonard J. Binns. Implementation considerations for inference detection: Intended vs. actual classification. In Proceedings of the IFIP WG 11.3 Seventh Annual Working Conference on Database Security, September 1993.
R. G. G. Cattell. An engineering database benchmark. In Michael Stonebraker, editor, Readings in Database Systems. Morgan Kaufman Publishers, Inc., 1994.
Thomas H. Hinke. Inference Aggregation Detection In Database Management Systems. In Proceedings 1988 IEEE Symposium on Security and Privacy, April 1988.
Thomas H. Hinke. Database Inference Engine Design Approach. In Carl E. Landwehr, editor, Database Security II: Status and Prospects. North-Holland, 1990.
Thomas H. Hinke and Harry S. Delugach. AERIE: Database Inference Modeling and Detection For Databases. In Proceedings IFIP WG 11.3 Sixth Working Conference on Database Security, August 1992.
Thomas H. Hinke and Harry S. Delugach. AERIE: Database Inference Modeling and Detection For Databases. In Bhavani M. Thuraisingham and Carl E. Landwehr, editors, Database Security VI: Status and Prospects. North-Holland, 1993.
Thomas H. Hinke, Harry S. Delugach, and Asha Chandrasekhar. Layered Knowledge Chunks for Database Inference. In Pmc. 7th IFIP WG 11.3 Working Conference on Database Security, Lake Guntersville State Park Lodge, Alabama, Sept. 12–15 1993.
Thomas H. Hinke, Harry S. Delugach, and Asha Chandrasekhar. Layered Knowledge Chunks for Database Inference. In T.F. Keefe and C.E. Landwehr, editors, Database Security VII: Status and Prospects. North-Holland, 1994.
Thomas H. Hinke, Harry S. Delugach, and Asha Chandrasekhar. A Fast Algorithm For Detecting Second Paths in Database Inference Analysis. Journal of Computer Security, 1995. (Accepted).
Joseph C. Giarratano. CLIPS User’s Guide, CLIPS Version 6.0. NASA Lyndon B. Johnson Space Center, Information Systems Directorate, Software Technology Branch, May 1993.
Teresa F. Lunt. Toward a Multilevel Relational Data Language. In Proceedings of the Fourth IFIP Aerospace Computer Security Applications Conference, December 1988.
NASA Lyndon B. Johnson Space Center, Information Systems Directorate, Software Technology Branch. CLIPS Reference Manual, Volume I, J Basic Programming Guide, CLIPS Version 6.0, June 1993.
NASA Lyndon B. Johnson Space Center, Information Systems Directorate, Software Technology Branch. CLIPS Reference Manual, Volume II, J Advanced Programming Guide, CLIPS Version 6.0, January 1994.
Xiaolei Qian, Mark E. Stickel, Peter D. Karp, Teresa E Lunt, and Thomas D. Garvey. Detection and elimination of inference channels in multilevel relational database systems. In Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy, May 1993.
Alfred Round. Knowledge Based Simulation: D4 Rule-driven Simulation. In Avron Barr, Paul R. Cohen, and Edward A. Feigenbaum, editors, The Handbook of Artificial Intelligence. Addison Wesley, 1989.
Bhavani Thuraisingham. The use of conceptual structures for handling the inference problem, and cover stories for database security. In Proc. 5th IFIP WG 11.3 Working Conference on Database Security, November 1991.
Jeffrey D. Ullman. Principles of Database and Knowledge-base Systems, Volume 1. Computer Science Press, Rockville, MD, 1988.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Hinke, T.H., Delugach, H.S., Wolf, R.P. (1996). ILIAD: An Integrated Laboratory for Inference Analysis and Detection. In: Spooner, D.L., Demurjian, S.A., Dobson, J.E. (eds) Database Security IX. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34932-9_21
Download citation
DOI: https://doi.org/10.1007/978-0-387-34932-9_21
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2954-1
Online ISBN: 978-0-387-34932-9
eBook Packages: Springer Book Archive