Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1413140.1413183acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

An abstract interface for cyber-defense mechanisms

Published: 12 May 2008 Publication History

Abstract

Defending a computer system against malicious attack depends on making many different defense mechanisms work together. In addition to protecting against intrusions, these mechanisms should provide intrusion detection and response. The semantics of input and output for these mechanisms -- what the alert from an intrusion detector means, and the implications of issuing a command in response -- can vary greatly from one mechanism to another. In this paper, we discuss the abstract interface we have developed for integrating various defense mechanisms to defend a distributed application. Our interface is more than an API: it defines not only the syntax of communication with defense mechanisms but also its meaning, thus allowing us to reason systematically about the state of attack and defense. We briefly describe our current work toward automating that reasoning and thus toward applications that defend themselves intelligently and automatically. We also argue that reasoning about attack and defense at an abstract level allows one to model and analyze whether the defense is effective.

Supplementary Material

Related slides. (a37-webber-slides.pdf)
Slide presentation for "An abstract interface for cyber-defense mechanisms"

References

[1]
B. Blakely. The emperor's old armor. In New Security Paradigms Workshop, pages 2--16, Sept. 1996.
[2]
J. Chong et al. Survivability architecture of a mission-critical system: The DPASA example. In Comp. Security Applications Conf., Dec. 2005.
[3]
S. Kent. On the trail of intrusions into information systems. IEEE Spectrum, Dec. 2000.
[4]
P. G. Neumann and P. A. Porras. Experience with EMERALD to date. In Proc. 1st Usenix Workshop on Intrusion Detection and Network Monitoring, Apr. 1999.
[5]
SourceFire. Snort: the de facto standard for intrusion detection. Internet URL http://snort.org, 2008.
[6]
P. Thagard and K. Verbeurgt. Coherence as constraint satisfaction. Cognitive Science, 22:1--24, 1998.
[7]
F. Webber et al. A model of quarantine in cyber-defense. Technical Report ITUA Validation Report, Chapter 5, F30602-00-C-0172, BBN Technologies, 2004.
[8]
F. Webber, P. Pal, et al. Defense-enabled applications. In DARPA Info. Survivability Conf. and Expo., May 2001.

Index Terms

  1. An abstract interface for cyber-defense mechanisms

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CSIIRW '08: Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
      May 2008
      470 pages
      ISBN:9781605580982
      DOI:10.1145/1413140
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 May 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article

      Conference

      CSIIRW '08

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 217
        Total Downloads
      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 12 Nov 2024

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media