Intrusion Detection using ASTDs

01/29/2020
by   LionelTidjon, et al.
0

In this paper, we show the application of ASTDs to intrusion detection. ASTD is an executable, modular and graphical notation that allows for the composition of hierarchical state machines with process algebra operators to model complex attack phases. We first define an ASTD specification methodology using attack pattern databases. Next, we specify a case study of ransomwares using Snort, Zeek, ASTD, and other intrusion detection languages in the literature. After that, we execute the languages using recent datasets and a real-time testbed on ransomwares, compare and discuss results. Overall, ASTD attack specifications are more concise than industrial tools like Snort, Zeek, and other attack languages in the literature. For intrusion detection, iASTD (the ASTD interpreter) and Zeek provided similar results. iASTD produced less false positives and a smaller number of true positives per attack than Snort, which is an important factor to deal with huge amounts of events. The processing time of iASTD on the real-time testbed is slower than Snort and Zeek, but it can be improved by compiling ASTD specifications into Zeek scripts.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/04/2018

Provenance-based Intrusion Detection: Opportunities and Challenges

Intrusion detection is an arms race; attackers evade intrusion detection...
research
03/14/2022

Base-Rate Fallacy Redux and a Deep Dive Review in Cybersecurity

This paper examines the current state of the science underlying cybersec...
research
11/27/2018

A Real-Time Remote IDS Testbed for Connected Vehicles

Connected vehicles are becoming commonplace. A constant connection betwe...
research
03/22/2010

Integrating Real-Time Analysis With The Dendritic Cell Algorithm Through Segmentation

As an immune inspired algorithm, the Dendritic Cell Algorithm (DCA) has ...
research
03/16/2022

Maintainable Log Datasets for Evaluation of Intrusion Detection Systems

Intrusion detection systems (IDS) monitor system logs and network traffi...
research
09/24/2017

Intrusions in Marked Renewal Processes

We present a probabilistic model of an intrusion in a marked renewal pro...
research
09/18/2019

Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study

Intrusion Detection Systems (IDSs) are a necessary cyber defense mechani...

Please sign up or login with your details

Forgot password? Click here to reset