NSDF:: a computer network system description framework and its application to network security

被引:2
作者
Estévez-Tapiador, JM [1 ]
García-Teodoro, P [1 ]
Díaz-Verdejo, JE [1 ]
机构
[1] Univ Granada, Res Grp Signals Telemat & Commun, Dept Elect & Comp Technol, ETS Ingn Informat, E-18071 Granada, Spain
来源
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING | 2003年 / 43卷 / 05期
关键词
computer network description; computer network security; intrusion detection; intrusion response; intrusion taxonomies;
D O I
10.1016/S1389-1286(03)00291-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work a general framework, termed NSDF, for describing network systems is proposed. Basic elements of this scheme are entities and the relationships established between them. Both entities and relationships are the basis underlying the concept of system state. The dynamics of a network system can be conceived of as a trajectory in the state space. The term action is used to describe every event which can produce a transition from one state to another. These concepts (entity, relationship, state, and action) are enough to construct a model of the system. Evolution and dynamism are easily captured, and it is possible to monitor the behaviour of the system. With the aim of illustrating the use of the proposed framework, a network state description language derived from NSDF, termed RENDL, is also specified. An immediate application of this framework concerns the network security field. It is shown that concepts like security policing of the site, insecure states, intrusive activities and intrusion response mechanisms can be modelled well. Thus, some imprecise terms used in the security context can be expressed in a uniform, precise way within this framework. Formalizing the above concepts allows us to introduce a generic model to classify currently presented taxonomies related to intrusive activities in network systems. This provides a general context for a better understanding of security flaws and how to develop effective defenses. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:573 / 600
页数:28
相关论文
共 21 条
[1]  
Amoroso E.G., 1994, FUNDAMENTALS COMPUTE
[2]  
AMOROSO EG, 1999, INTRUSION DETECTION, P100
[3]  
[Anonymous], 1989, 12 NATL COMPUTER SEC
[4]  
ASLAM T, 1995, THESIS PURDUE U W LA
[5]  
Beizer B., 2003, Software Testing Techniques
[6]  
CARVER C, 2000, P 2000 IEEE WORKSH I
[7]  
*CERT COORD CTR, CERT CC STAT 1998 20
[8]  
Cohen FB., 1995, PROTECTION SECURITY
[9]  
FISCH EA, 1996, THESIS TEXAS A M U C
[10]  
Hogan C. B., 1988, Operating Systems Review, V22, P7, DOI 10.1145/47671.47672