Abstract
Network Monitoring and Intrusion Detection Systems plays an important role in today’s computer networks health, allowing the diagnosis and detection of anomalous situations on the network that could damage the performance and put the security of users data in risk if not detected or diagnosed in time to take any necessary measures.
In this paper we present a preliminary specification and analysis of a network monitoring and intrusion detection concept system based on constraint programming, implemented on several constraint solver systems. This concept allows to describe the desirable network situations through constraints on network entities, allowing a more expressive and clear way of describing network situations.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Rossi, F., Van Beek, P., Walsh, T.: Handbook of constraint programming. Elsevier Science, Amsterdam (2006)
Apt, K.R.: Principles of constraint programming. Cambridge Univ. Pr., Cambridge (2003)
Schulte, C.: Programming Constraint Services. LNCS (LNAI), vol. 2302. Springer, Heidelberg (2002)
Harlan, R.C.: Network management with nagios. Linux J. 2003(111), 3 (2003)
Barth, W.: Nagios: System and network monitoring. No Starch Press, San Francisco (2006)
Roesch, M.: Snort - lightweight intrusion detection for networks. In: LISA 1999: Proceedings of the 13th USENIX Conference on System Administration, pp. 229–238. USENIX Association, Berkeley (1999)
Beale, J.: Snort 2.1 Intrusion Detection, 2nd edn. Syngress Publishing (2004)
Diaz, D., Codognet, P.: Design and implementation of the gnu prolog system. Journal of Functional and Logic Programming 2001(6), 542 (2001)
Carlsson, M., Ottosson, G., Carlson, B.: An open-ended finite domain constraint solver. LNCS, pp. 191–206 (1997)
Schulte, C., Stuckey, P.J.: Speeding up constraint propagation. In: Wallace, M. (ed.) CP 2004. LNCS, vol. 3258, pp. 619–633. Springer, Heidelberg (2004)
Gecode/R Team. Gecode/R: Constraint Programming in Ruby, http://gecoder.org/
Correia, M., Barahona, P.: Overview of the CaSPER* Constraint Solvers. In: Third International CSP Solver Competition, p. 15 (2008)
tcpdump web page (April 2009), http://www.tcpdump.org/
Van Deursen, A., Visser, J.: Domain-specific languages: An annotated bibliography. ACM Sigplan Notices 35(6), 26–36 (2000)
Van Hentenryck, P., Michel, L.: Constraint-based local search. MIT Press, Cambridge (2005)
Codognet, P., Díaz, D.: Yet another local search method for constraint solving. In: Steinhöfel, K. (ed.) SAGA 2001. LNCS, vol. 2264, pp. 73–90. Springer, Heidelberg (2001)
Kahle, J.A., Day, M.N., Hofstee, H.P., Johns, C.R., Maeurer, T.R., Shippy, D.: Introduction to the Cell multiprocessor. IBM Journal of Research and Development 49(4/5), 589–604 (2005)
Abreu, S., Diaz, D., Codognet, P.: Parallel local search for solving constraint problems on the cell broadband engine (preliminary results). CoRR, abs/0910.1264 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Salgueiro, P., Abreu, S. (2011). Network Monitoring with Constraint Programming: Preliminary Specification and Analysis. In: Abreu, S., Seipel, D. (eds) Applications of Declarative Programming and Knowledge Management. INAP 2009. Lecture Notes in Computer Science(), vol 6547. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20589-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-20589-7_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20588-0
Online ISBN: 978-3-642-20589-7
eBook Packages: Computer ScienceComputer Science (R0)