Skip to main content

Network Monitoring with Constraint Programming: Preliminary Specification and Analysis

  • Conference paper
  • 301 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6547))

Abstract

Network Monitoring and Intrusion Detection Systems plays an important role in today’s computer networks health, allowing the diagnosis and detection of anomalous situations on the network that could damage the performance and put the security of users data in risk if not detected or diagnosed in time to take any necessary measures.

In this paper we present a preliminary specification and analysis of a network monitoring and intrusion detection concept system based on constraint programming, implemented on several constraint solver systems. This concept allows to describe the desirable network situations through constraints on network entities, allowing a more expressive and clear way of describing network situations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rossi, F., Van Beek, P., Walsh, T.: Handbook of constraint programming. Elsevier Science, Amsterdam (2006)

    MATH  Google Scholar 

  2. Apt, K.R.: Principles of constraint programming. Cambridge Univ. Pr., Cambridge (2003)

    Book  MATH  Google Scholar 

  3. Schulte, C.: Programming Constraint Services. LNCS (LNAI), vol. 2302. Springer, Heidelberg (2002)

    MATH  Google Scholar 

  4. Harlan, R.C.: Network management with nagios. Linux J. 2003(111), 3 (2003)

    Google Scholar 

  5. Barth, W.: Nagios: System and network monitoring. No Starch Press, San Francisco (2006)

    Google Scholar 

  6. Roesch, M.: Snort - lightweight intrusion detection for networks. In: LISA 1999: Proceedings of the 13th USENIX Conference on System Administration, pp. 229–238. USENIX Association, Berkeley (1999)

    Google Scholar 

  7. Beale, J.: Snort 2.1 Intrusion Detection, 2nd edn. Syngress Publishing (2004)

    Google Scholar 

  8. Diaz, D., Codognet, P.: Design and implementation of the gnu prolog system. Journal of Functional and Logic Programming 2001(6), 542 (2001)

    MATH  Google Scholar 

  9. Carlsson, M., Ottosson, G., Carlson, B.: An open-ended finite domain constraint solver. LNCS, pp. 191–206 (1997)

    Google Scholar 

  10. Schulte, C., Stuckey, P.J.: Speeding up constraint propagation. In: Wallace, M. (ed.) CP 2004. LNCS, vol. 3258, pp. 619–633. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Gecode/R Team. Gecode/R: Constraint Programming in Ruby, http://gecoder.org/

  12. Correia, M., Barahona, P.: Overview of the CaSPER* Constraint Solvers. In: Third International CSP Solver Competition, p. 15 (2008)

    Google Scholar 

  13. tcpdump web page (April 2009), http://www.tcpdump.org/

  14. Van Deursen, A., Visser, J.: Domain-specific languages: An annotated bibliography. ACM Sigplan Notices 35(6), 26–36 (2000)

    Article  Google Scholar 

  15. Van Hentenryck, P., Michel, L.: Constraint-based local search. MIT Press, Cambridge (2005)

    MATH  Google Scholar 

  16. Codognet, P., Díaz, D.: Yet another local search method for constraint solving. In: Steinhöfel, K. (ed.) SAGA 2001. LNCS, vol. 2264, pp. 73–90. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  17. Kahle, J.A., Day, M.N., Hofstee, H.P., Johns, C.R., Maeurer, T.R., Shippy, D.: Introduction to the Cell multiprocessor. IBM Journal of Research and Development 49(4/5), 589–604 (2005)

    Article  Google Scholar 

  18. Abreu, S., Diaz, D., Codognet, P.: Parallel local search for solving constraint problems on the cell broadband engine (preliminary results). CoRR, abs/0910.1264 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Salgueiro, P., Abreu, S. (2011). Network Monitoring with Constraint Programming: Preliminary Specification and Analysis. In: Abreu, S., Seipel, D. (eds) Applications of Declarative Programming and Knowledge Management. INAP 2009. Lecture Notes in Computer Science(), vol 6547. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20589-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20589-7_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20588-0

  • Online ISBN: 978-3-642-20589-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics