Application of software fault tree method in intrusion detection system analysis

被引:0
|
作者
Yuan, J [1 ]
Long, Y [1 ]
Hu, CH [1 ]
Huang, Y [1 ]
机构
[1] Xian Res Inst Hi Tech, Xian, Peoples R China
来源
ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 7 | 2005年
关键词
software fault tree (SFT); intrusion; intrusion detection system (IDS);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, software fault tree analysis (SFTA) is used to assist in determining and verifying the requirements for an intrusion detection system (IDS). Division Of fault trees for intrusions into seven stages was examined. and sample fault trees for each of the intrusion stages were described and penetration fault tree is given as in example. Using these staged subtrees, two intrusions were examined and software requirements for detection of the attacks were derived from examination of the trees and associated minimum cut sets. An example use of software fault tree analysis for guiding countermeasures' requirements analysis was also described.
引用
收藏
页码:481 / 486
页数:6
相关论文
共 50 条
  • [31] Analysis on the Application of Campus Network Firewall And Intrusion Detection System
    Wang, Jinying
    Yan, Pengfei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 398 - 401
  • [32] Application Research on Retrospective Analysis System in Network Intrusion Detection
    Wu, Wei
    Cheng, Nan
    Wang, Yubin
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 624 - 627
  • [33] Fault tree analysis of KNICS RPS software
    Park, Gee-Yong
    Koh, Kwang Yong
    Jee, Eunkyoung
    Seong, Poong Hyun
    Kwon, Kee-Choon
    Lee, Dae Hyung
    NUCLEAR ENGINEERING AND TECHNOLOGY, 2008, 40 (05) : 397 - 408
  • [34] Application and Performance Analysis of Data Preprocessing for Intrusion Detection System
    Jiang, Shuai
    Xu, Xiaolong
    SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 163 - 177
  • [35] Software fault tree analysis for product lines
    Dehlinger, J
    Lutz, RR
    EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2004, : 12 - 21
  • [36] Fault tree analysis of software reliability allocation
    Xiang, JW
    Futatsugi, K
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 460 - 465
  • [37] Application of dynamic fault tree analysis to software and hardware fault-tolerant control computer systems
    2000, AAAS Press of Chinese Society of Aeronautics and Astronautics, China (21):
  • [38] A Fault Tree Cyber Security Analysis of Power System State Estimation Software
    Kolosok, Irina
    Korkina, Elena
    Mahnitko, Anatolijs
    PROCEEDINGS OF THE 9TH INTERNATIONAL SCIENTIFIC SYMPOSIUM ON ELECTRICAL POWER ENGINEERING (ELEKTROENERGETIKA 2017), 2017, : 349 - 353
  • [39] Research on the Application of Fuzzy Fault Tree Analysis Method in the Machinery Equipment Fault Diagnosis
    Chen, Yuliang
    Zhang, Tiejun
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 1, 2010, : 84 - 87
  • [40] Research of fault diagnosis system in hydraulic system based on fuzzy fault tree analysis method
    Zuo, Jianmin
    Wang, Shucheng
    Nanjing Hangkong Hangtian Daxue Xuebao/Journal of Nanjing University of Aeronautics & Astronautics, 1999, 31 (06): : 716 - 721