Skip to main content
Log in

A model of the behavior of network objects in distributed computer systems

  • Published:
Programming and Computer Software Aims and scope Submit manuscript

Abstract

A model designed for the analysis of intrusion detection methods is described. The model also helps validate such methods and estimate their complexity. In terms of this model, a new intrusion detection method is proposed, its validity is proved, and its computational complexity is evaluated. It differs from the available expert-based methods in that it does not impose constraints on the behavior being detected and makes it possible to detect unknown or modified attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Amoroso, E.G., Intrusion Detection, Sparta, NJ: Intrusion. Net Books, 1999.

    Google Scholar 

  2. Ranum, M.J., Experiences Benchmarking Intrusion Detection Systems, http://www.snort.org /docs/Benchmarking-IDS-NFR.pdf.

  3. Smelyanskii, R.L., A Model of the Operation of Distributed Computer Systems, Vestn. Mosk. Univ., Ser. 15, Vychisl. Mat. Kibern., No. 3, pp. 3–21.

  4. Eckmann, S.T., Vigna, G., and Kemmerer, R.A., STATL: An Attack Language for State-Based Intrusion Detection, Depart. Of Computer Science, Univ. of California: Santa Barbara, 2000.

    Google Scholar 

  5. Sheyner, O., Scenario Graphs and Attack Graphs, PhD thesis, SCS, Carnegie Mellon Univ., 2004.

  6. Smelyanskii, R.L. and Gamayunov, D.Yu., Modern Noncommercial Tools for Attack Detection, Moscow: Faculty of Computational Mathematics and Cybernetics, Mosc. Gos. Univ., 2002.

    Google Scholar 

  7. Smelyanskii, R.L. and Kachalin, A.I., Application of Neuron Networks for Detecting of Anomalous Behavior of Objects in Computer Networks, Moscow: Faculty of Computational Mathematics and Cybernetics, Mosc. Gos. Univ., 2004.

    Google Scholar 

  8. Gorodetski, V.I. and Kotenko, I.V., Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool, St. Petersburg Institute for Informatics and Automation, RAID, 2002, pp. 219–238.

  9. GOST (State Standard) R 50922-96: Information Protection: Main Terms and Definitions, 1996.

Download references

Author information

Authors and Affiliations

Authors

Additional information

Original Russian Text © D. Yu. Gamayunov, R. L. Smelyanskii, 2007, published in Programmirovanie, 2007, Vol. 33, No. 4.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gamayunov, D.Y., Smelyanskii, R.L. A model of the behavior of network objects in distributed computer systems. Program Comput Soft 33, 195–203 (2007). https://doi.org/10.1134/S0361768807040020

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S0361768807040020

Keywords

Navigation