Ontology type: schema:Chapter
2000
AUTHORSFrédéric Cuppens , Rodolphe Ortalo
ABSTRACTThis article presents an attack description language. This language is based on logic and uses a declarative approach. In the language, the conditions and effects of an attack are described with logical formulas related to the state of the target computer system. The various steps of the attack process are associated to events, which may be combined using specific algebraic operators. These elements provide a description of the attack from the point of view of the attacker. They are complemented with additional elements corresponding to the point of view of intrusion detection systems and audit programs. These detection and verification aspects provide the language user with means to tailor the description of the attack to the needs of a specific intrusion detection system or a specific environment. More... »
PAGES197-216
Recent Advances in Intrusion Detection
ISBN
978-3-540-41085-0
978-3-540-39945-2
http://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13
DOIhttp://dx.doi.org/10.1007/3-540-39945-3_13
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1007204231
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Computer Software",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Office National d'\u00c9tudes et de Recherches A\u00e9rospatiales",
"id": "https://www.grid.ac/institutes/grid.4365.4",
"name": [
"ONERA, Centre de Toulouse, 2, avenue Edouard Belin, 31055\u00a0Toulouse cedex 4, France"
],
"type": "Organization"
},
"familyName": "Cuppens",
"givenName": "Fr\u00e9d\u00e9ric",
"id": "sg:person.016707377535.37",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016707377535.37"
],
"type": "Person"
},
{
"affiliation": {
"name": [
"NEUROCOM, Ter Sud A - Z.I. La Plaine, 5, avenue Marcel Dassault, 31500\u00a0Toulouse, France"
],
"type": "Organization"
},
"familyName": "Ortalo",
"givenName": "Rodolphe",
"id": "sg:person.013363420557.32",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013363420557.32"
],
"type": "Person"
}
],
"citation": [
{
"id": "https://doi.org/10.1109/risp.1993.287646",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094598432"
],
"type": "CreativeWork"
}
],
"datePublished": "2000",
"datePublishedReg": "2000-01-01",
"description": "This article presents an attack description language. This language is based on logic and uses a declarative approach. In the language, the conditions and effects of an attack are described with logical formulas related to the state of the target computer system. The various steps of the attack process are associated to events, which may be combined using specific algebraic operators. These elements provide a description of the attack from the point of view of the attacker. They are complemented with additional elements corresponding to the point of view of intrusion detection systems and audit programs. These detection and verification aspects provide the language user with means to tailor the description of the attack to the needs of a specific intrusion detection system or a specific environment.",
"editor": [
{
"familyName": "Debar",
"givenName": "Herv\u00e9",
"type": "Person"
},
{
"familyName": "M\u00e9",
"givenName": "Ludovic",
"type": "Person"
},
{
"familyName": "Wu",
"givenName": "S. Felix",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/3-540-39945-3_13",
"inLanguage": [
"en"
],
"isAccessibleForFree": false,
"isPartOf": {
"isbn": [
"978-3-540-41085-0",
"978-3-540-39945-2"
],
"name": "Recent Advances in Intrusion Detection",
"type": "Book"
},
"name": "LAMBDA: A Language to Model a Database for Detection of Attacks",
"pagination": "197-216",
"productId": [
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/3-540-39945-3_13"
]
},
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"225071ca74656b39adde3160d291d02bb0dc329a72cabb7879bb440091df30cf"
]
},
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1007204231"
]
}
],
"publisher": {
"location": "Berlin, Heidelberg",
"name": "Springer Berlin Heidelberg",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/3-540-39945-3_13",
"https://app.dimensions.ai/details/publication/pub.1007204231"
],
"sdDataset": "chapters",
"sdDatePublished": "2019-04-15T19:50",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8687_00000012.jsonl",
"type": "Chapter",
"url": "http://link.springer.com/10.1007/3-540-39945-3_13"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13'
This table displays all metadata directly associated to this object as RDF triples.
87 TRIPLES
23 PREDICATES
28 URIs
20 LITERALS
8 BLANK NODES