Skip to main content

Formal Specification for Fast Automatic IDS Training

  • Conference paper
Book cover Formal Aspects of Security (FASec 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2629))

Included in the following conference series:

Abstract

This paper illustrates a methodology for the synthesis of the behavior of an application program in terms of the set of system calls invoked by the program. The methodology is completely automated, with the exception of the description of the high level specification of the application program, which is demanded to the system analyst. The technology employed (VSP/CVS) for such synthesis minimizes the efforts required to code the specification of the application. The methodology is completely independent from the intrusion detection tool adopted, and appears suitable to derive the expected behavior of a secure WEB server that can effectively support the increasing request of security that affects the e-commerce. As a case study, the methodology is applied to the Post Office Protocol, the ipop3d daemon.

The authors were partially supported by the project Web-MiNDS and by the Italian MIUR under the FIRB program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bernaschi, M., Gabrielli, E., Mancini, L.V.: Remus: a security-enhanced operating system. ACM Transactions on Information and System Security (TISSEC) 5(1), 36–61 (2002)

    Article  Google Scholar 

  2. Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: attacks and defences for the vulnerability of the decade. In: Proceedings IEEE DARPA Information Survivability Conference and Expo (January 2000)

    Google Scholar 

  3. Durante, A., Focardi, R., Gorrieri, R.: A compiler for analyzing cryptographic protocols using noninterference. ACM Transactions on Software Engineering and Methodology (TOSEM) 9(4), 488–528 (2000)

    Article  Google Scholar 

  4. Durante, A., Focardi, R., Gorrieri, R.: CVS at work: A report on new failures upon some cryptographic protocols. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 287–299. Springer, Heidelberg (2001)

    Google Scholar 

  5. Focardi, R., Gorrieri, R.: The compositional security checker: A tool for the verification of information flow security properties. Software Engineering 23(9), 550–571 (1997)

    Article  Google Scholar 

  6. Fraser, T., Badger, L., Feldman, M.: Hardening COTS software with generic software wrappers. In: IEEE Symposium on Security and Privacy, pp. 2–16 (1999)

    Google Scholar 

  7. Ghormley, D.P., Petrou, D., Rodrigues, S.H., Anderson, T.E.: SLIC: An extensibility system for commodity operating systems. In: Proceedings of the USENIX 1998 Annual Technical Conference, Berkeley, USA, June 15–19, pp. 39–52. USENIX Association (1998)

    Google Scholar 

  8. Ghosh, A.K., Schwartzbard, A., Schatz, M.: Learning program behavior profiles for intrusion detection. In: Proceedings 1st USENIX Workshop on Intrusion Detection and Network Monitoring, pp. 51–62 (April 1999)

    Google Scholar 

  9. Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security 6(3), 151–180 (1998)

    Google Scholar 

  10. IETF Internet Draft, http://www.ietf.org/rfc.html

  11. http://www.faqs.org/rfcs/rfc1939.html

  12. Ilgun, K., Kemmerer, R.A., Porras, P.A.: State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering 21(3), 181–199 (1995)

    Article  Google Scholar 

  13. Jajodia, S., Lin, J.L., Wang, X.S.: Abstraction-based misuse detection: High-level specifications and adaptable strategies. In: PCSFW: Proceedings of The 11th Computer Security Foundations Workshop, pp. 190–201. IEEE Computer Society Press, Los Alamitos (1998)

    Google Scholar 

  14. Lippmann, R.P.: Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation. In: Proceedings DARPA Information Survivability Conference and Exposition (DISCEX). IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

  15. Milner, R.: Communication and concurrency. Prentice Hall, New York (1989)

    MATH  Google Scholar 

  16. Security Enhanced Linux, http://www.nsa.gov/selinux

  17. Sekar, R., Bendre, M., Dhurjati, D., Bollineni, P.: A fast automation-based method for detecting anomalous program behavior. In: IEEE Symposium on Security and Privacy, Oackland CA, pp. 144–155 (May 2001)

    Google Scholar 

  18. Sekar, R., Uppuluri, P.: Synthesizing fast intrusion prevention/detection systems from high-level specifications. In: Proceedings of the 8th USENIX Security Symposium, Washington DC, USA, pp. 63–78 (August 1999)

    Google Scholar 

  19. Szyperski, C., Gruntz, D., Murer, S.: Component software: Beyond object-oriented programming. Addison-Wesley / ACM Press (2002)

    Google Scholar 

  20. Portnoy, L., Eskin, E., Stolfo, S.: Intrusion Detection with Unlabeled Data Using Clustering. In: Proceedings of the ACM CSS Workshop on Data Mining for Security Applications, November 8 (2001)

    Google Scholar 

  21. Wagner, D., Dean, D.: Intrusion detection via static analysis. In: IEEE Symposium on Security and Privacy, Oackland CA, pp. 156–169 (2001)

    Google Scholar 

  22. Wagner, D., Soto, P.: Mimicry Attacks on Host-Based Intrusion Detection Systems. In: Ninth ACM Conference on Computer and Communications Security, Washington, DC, USA, November 18-22 (2002)

    Google Scholar 

  23. Walker, K.M., Sterne, D.F., Badger, M.L., Petkac, M.J., Shermann, D.L., Oostendorp, K.: Confining root programs with domain and type enforcement (DTE). In: Proceeding of the 6th USENIX UNIX Security Symposium, San Jose, California, USA (July 1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Durante, A., Di Pietro, R., Mancini, L.V. (2003). Formal Specification for Fast Automatic IDS Training. In: Abdallah, A.E., Ryan, P., Schneider, S. (eds) Formal Aspects of Security. FASec 2002. Lecture Notes in Computer Science, vol 2629. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40981-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-40981-6_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20693-4

  • Online ISBN: 978-3-540-40981-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics