City Research Online

From Monitoring Templates to Security Monitoring and Threat Detection

Amálio, N. & Spanoudakis, G. (2008). From Monitoring Templates to Security Monitoring and Threat Detection. 2008 Second International Conference on Emerging Security Information, Systems and Technologies, pp. 185-192. doi: 10.1109/securware.2008.58

Abstract

This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks supporting the construction of secure and dependable systems for ambient intelligence. Our patterns infra-structure is based on templates. From templates we generate event-calculus formulas expressing security requirements to monitor at run-time. From these theories we generate attack signatures, describing threats or possible attacks to the system. At run-time, we evaluate the likelihood of threats from run-time observations using a probabilistic model based on Bayesian networks.

Publication Type: Article
Additional Information: © 2008 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Publisher Keywords: Security, patterns, intrusion-detection, run-time monitoring, Event-Calculus
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Departments: School of Science & Technology > Computer Science
SWORD Depositor:
[thumbnail of securware08.pdf]
Preview
Text - Accepted Version
Download (633kB) | Preview

Export

Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email

Downloads

Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login