Real-time protocol analysis for detecting link-state routing protocol attacks
- 1 February 2001
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 4 (1) , 1-36
- https://doi.org/10.1145/383775.383776
Abstract
A real-time knowledge-based network intrusion-detection model for a link-state routing protocol is presented for the OSPF protocol. This model includes three layers: a data process layer to parse packets and dispatch data; and event abstractor to abstract predefined real-time events for the link-state routing protocol; and an extended timed finite state machine to express the real-time behavior of the protocol engine and to detect intrusions by pattern matching. The timed FSM, called the JiNao Finite State Machine (JFSM) is extended from the conventional FSM with timed states, multiple timers, and time constraints on state transitions. The JFSM is implemented as a generator that can create and FSM by constructing the configuration file only. The results show that this approach is very effective for detecting real-time intrusions. Our approach can be extended for use in other network protocol intrusion-detection systems, especially for those with known attacks.Keywords
This publication has 12 references indexed in Scilit:
- A simple assertional proof system for real-time systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Detecting disruptive routers: a distributed network monitoring approachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A theory of timed automataPublished by Elsevier ,2002
- Timed AutomataPublished by Springer Nature ,1999
- State transition analysis: a rule-based intrusion detection approachIEEE Transactions on Software Engineering, 1995
- Network intrusion detectionIEEE Network, 1994
- Reasoning assertionally about real-time systemsProceedings of the IEEE, 1994
- Protocol verification made simple: a tutorialComputer Networks and ISDN Systems, 1993
- An Intrusion-Detection ModelIEEE Transactions on Software Engineering, 1987
- Self-stabilizing systems in spite of distributed controlCommunications of the ACM, 1974