Abstract

Part 2: Real World; International audience; In this paper, we present a practical approach to generate the constraint engine for an effective constraint-based intrusion detection system (IDS). The IDS framework was designed for safety-sensitive networks that involve limited-access closed networks such as the networks for command and control systems or Air Traffic Control (ATC) systems. The constraint engine generated by the framework supports real-time performance while ensuring the intended, normal behaviour of its target networks. We present the IDS framework in terms of its internal DSL representation as well as its transformation mechanisms to generate the constraint engine code. Comparing the autogenerated version against a manually implemented, optimized version of the constraint engine indicates no significant difference in terms of their performance.

Document type: Conference object


Original document

The different versions of the original document can be found in:

http://dx.doi.org/10.1007/978-3-030-20074-9_5 under the license http://creativecommons.org/licenses/by/
https://hal.archives-ouvertes.fr/hal-02294615/document,
https://hal.archives-ouvertes.fr/hal-02294615/file/484602_1_En_5_Chapter.pdf under the license http://www.springer.com/tdm
https://dblp.uni-trier.de/db/conf/wistp/wistp2018.html#RakhaID18,
https://rd.springer.com/chapter/10.1007/978-3-030-20074-9_5,
https://academic.microsoft.com/#/detail/2944758595 under the license http://creativecommons.org/licenses/by/
Back to Top

Document information

Published on 01/01/2018

Volume 2018, 2018
DOI: 10.1007/978-3-030-20074-9_5
Licence: Other

Document Score

0

Views 0
Recommendations 0

Share this document

claim authorship

Are you one of the authors of this document?