Abstract
Even so-called ‘secure verified systems’ proven to fulfill a certain security policy cannot guarantee security in its semantic sense of protection against all kinds of illegal misuses. A combination of formal and heuristically learning system components might help.
In this paper, we describe the concept of an Intrusion Detection and Avoidance System (IDA-System), that is a combination of a formal security kernel realizing the reference monitor concept with an adaptively learning intrusion detection component. This IDA-system is capable of detecting and avoiding intrusion, also such kinds of attack-strategies that are unknown so far or are spread over a large period of time. Thus it can significantly improve system security. Its deficiencies such as dangers to privacy and how to control them are also discussed.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
S. Ames, M. Gasser, R. Shell, “Security Kernel Design and Implementation: An Introduction”, IEEE Computer, 1983, Vol. 16, No. 7.
K. Brunnstein, S. Fischer-Hiibner, “Risk Analysis of Trust Computer Sytems”, Proceedings IFIP-Sec’ 90 Conference, Helsinki, May 1990.
D. Denning, “An Intrusion-Detection Model”, Proceedings of the 1986 Symposium on Security and Privacy, IEEE Computer Society, Oakland, April 1986.
“DoD Trusted Computer Systems Evaluation Criteria”, DoD 5200.28-STD, Washington D.C., Department of Defence, 1985
S. Fischer-Hübner, K. Brunnstein, Opportunities and Risks of Intrusion Detection Expert Systems, Proceedings of the IFIP TC-9 Conference “Opportunities and Risks of AI Systems” (ORAIS’89), Hamburg 1989
R. Irving, C. Higgins, F. Safayemi, “Computerized Performance Monitoring Systems: Use and Abuse”, CACM Vol. 29, No. 8, 1986.
“IT-Security Criteria: Criteria for the Evaluation of Security of Information Technology”, Zentralstelle für Sicherheit in der Informationstechnik, Bonn, 1989.
T. Lunt, R. Jagannathan, R. Lee, A. Whitehurst, “Knowledge-Based Intrusion Detection”, Proceedings of the 1989 AI Systems in Government Confrence, March 1989.
T. Lunt, “Automated Audit Trail Analysis and Intrusion Detection: A Survey”, Proceedings of the 11th National Computer Security Conference, October 1988.
R. Whitehurst, M. Sebring, E. Shellhouse, M. Hanna, “Expert Systems in Intrusion Detection: A Case Study”, Proceedings of the 11th National Computer Security Conference, October 1988.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 British Computer Society
About this paper
Cite this paper
Fischer-Hübner, S., Brunnstein, K. (1990). Combining Verified and Adaptive System Components Towards More Secure Computer Architectures. In: Rosenberg, J., Keedy, J.L. (eds) Security and Persistence. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3178-6_21
Download citation
DOI: https://doi.org/10.1007/978-1-4471-3178-6_21
Publisher Name: Springer, London
Print ISBN: 978-3-540-19646-4
Online ISBN: 978-1-4471-3178-6
eBook Packages: Springer Book Archive