Skip to main content

Combining Verified and Adaptive System Components Towards More Secure Computer Architectures

  • Conference paper
Security and Persistence

Part of the book series: Workshops in Computing ((WORKSHOPS COMP.))

Abstract

Even so-called ‘secure verified systems’ proven to fulfill a certain security policy cannot guarantee security in its semantic sense of protection against all kinds of illegal misuses. A combination of formal and heuristically learning system components might help.

In this paper, we describe the concept of an Intrusion Detection and Avoidance System (IDA-System), that is a combination of a formal security kernel realizing the reference monitor concept with an adaptively learning intrusion detection component. This IDA-system is capable of detecting and avoiding intrusion, also such kinds of attack-strategies that are unknown so far or are spread over a large period of time. Thus it can significantly improve system security. Its deficiencies such as dangers to privacy and how to control them are also discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Ames, M. Gasser, R. Shell, “Security Kernel Design and Implementation: An Introduction”, IEEE Computer, 1983, Vol. 16, No. 7.

    Google Scholar 

  2. K. Brunnstein, S. Fischer-Hiibner, “Risk Analysis of Trust Computer Sytems”, Proceedings IFIP-Sec’ 90 Conference, Helsinki, May 1990.

    Google Scholar 

  3. D. Denning, “An Intrusion-Detection Model”, Proceedings of the 1986 Symposium on Security and Privacy, IEEE Computer Society, Oakland, April 1986.

    Google Scholar 

  4. “DoD Trusted Computer Systems Evaluation Criteria”, DoD 5200.28-STD, Washington D.C., Department of Defence, 1985

    Google Scholar 

  5. S. Fischer-Hübner, K. Brunnstein, Opportunities and Risks of Intrusion Detection Expert Systems, Proceedings of the IFIP TC-9 Conference “Opportunities and Risks of AI Systems” (ORAIS’89), Hamburg 1989

    Google Scholar 

  6. R. Irving, C. Higgins, F. Safayemi, “Computerized Performance Monitoring Systems: Use and Abuse”, CACM Vol. 29, No. 8, 1986.

    Google Scholar 

  7. “IT-Security Criteria: Criteria for the Evaluation of Security of Information Technology”, Zentralstelle für Sicherheit in der Informationstechnik, Bonn, 1989.

    Google Scholar 

  8. T. Lunt, R. Jagannathan, R. Lee, A. Whitehurst, “Knowledge-Based Intrusion Detection”, Proceedings of the 1989 AI Systems in Government Confrence, March 1989.

    Google Scholar 

  9. T. Lunt, “Automated Audit Trail Analysis and Intrusion Detection: A Survey”, Proceedings of the 11th National Computer Security Conference, October 1988.

    Google Scholar 

  10. R. Whitehurst, M. Sebring, E. Shellhouse, M. Hanna, “Expert Systems in Intrusion Detection: A Case Study”, Proceedings of the 11th National Computer Security Conference, October 1988.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1990 British Computer Society

About this paper

Cite this paper

Fischer-Hübner, S., Brunnstein, K. (1990). Combining Verified and Adaptive System Components Towards More Secure Computer Architectures. In: Rosenberg, J., Keedy, J.L. (eds) Security and Persistence. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3178-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-3178-6_21

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19646-4

  • Online ISBN: 978-1-4471-3178-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics