LAMBDA: A Language to Model a Database for Detection of Attacks View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2000

AUTHORS

Frédéric Cuppens , Rodolphe Ortalo

ABSTRACT

This article presents an attack description language. This language is based on logic and uses a declarative approach. In the language, the conditions and effects of an attack are described with logical formulas related to the state of the target computer system. The various steps of the attack process are associated to events, which may be combined using specific algebraic operators. These elements provide a description of the attack from the point of view of the attacker. They are complemented with additional elements corresponding to the point of view of intrusion detection systems and audit programs. These detection and verification aspects provide the language user with means to tailor the description of the attack to the needs of a specific intrusion detection system or a specific environment. More... »

PAGES

197-216

Book

TITLE

Recent Advances in Intrusion Detection

ISBN

978-3-540-41085-0
978-3-540-39945-2

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13

DOI

http://dx.doi.org/10.1007/3-540-39945-3_13

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1007204231


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Office National d'\u00c9tudes et de Recherches A\u00e9rospatiales", 
          "id": "https://www.grid.ac/institutes/grid.4365.4", 
          "name": [
            "ONERA, Centre de Toulouse, 2, avenue Edouard Belin, 31055\u00a0Toulouse cedex 4, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Cuppens", 
        "givenName": "Fr\u00e9d\u00e9ric", 
        "id": "sg:person.016707377535.37", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016707377535.37"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "NEUROCOM, Ter Sud A - Z.I. La Plaine, 5, avenue Marcel Dassault, 31500\u00a0Toulouse, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ortalo", 
        "givenName": "Rodolphe", 
        "id": "sg:person.013363420557.32", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013363420557.32"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1109/risp.1993.287646", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094598432"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2000", 
    "datePublishedReg": "2000-01-01", 
    "description": "This article presents an attack description language. This language is based on logic and uses a declarative approach. In the language, the conditions and effects of an attack are described with logical formulas related to the state of the target computer system. The various steps of the attack process are associated to events, which may be combined using specific algebraic operators. These elements provide a description of the attack from the point of view of the attacker. They are complemented with additional elements corresponding to the point of view of intrusion detection systems and audit programs. These detection and verification aspects provide the language user with means to tailor the description of the attack to the needs of a specific intrusion detection system or a specific environment.", 
    "editor": [
      {
        "familyName": "Debar", 
        "givenName": "Herv\u00e9", 
        "type": "Person"
      }, 
      {
        "familyName": "M\u00e9", 
        "givenName": "Ludovic", 
        "type": "Person"
      }, 
      {
        "familyName": "Wu", 
        "givenName": "S. Felix", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-39945-3_13", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-41085-0", 
        "978-3-540-39945-2"
      ], 
      "name": "Recent Advances in Intrusion Detection", 
      "type": "Book"
    }, 
    "name": "LAMBDA: A Language to Model a Database for Detection of Attacks", 
    "pagination": "197-216", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-39945-3_13"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "225071ca74656b39adde3160d291d02bb0dc329a72cabb7879bb440091df30cf"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1007204231"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-39945-3_13", 
      "https://app.dimensions.ai/details/publication/pub.1007204231"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T19:50", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8687_00000012.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/3-540-39945-3_13"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13'


 

This table displays all metadata directly associated to this object as RDF triples.

87 TRIPLES      23 PREDICATES      28 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-39945-3_13 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author N039a82ad55f54e36be56c0e228ae64a6
4 schema:citation https://doi.org/10.1109/risp.1993.287646
5 schema:datePublished 2000
6 schema:datePublishedReg 2000-01-01
7 schema:description This article presents an attack description language. This language is based on logic and uses a declarative approach. In the language, the conditions and effects of an attack are described with logical formulas related to the state of the target computer system. The various steps of the attack process are associated to events, which may be combined using specific algebraic operators. These elements provide a description of the attack from the point of view of the attacker. They are complemented with additional elements corresponding to the point of view of intrusion detection systems and audit programs. These detection and verification aspects provide the language user with means to tailor the description of the attack to the needs of a specific intrusion detection system or a specific environment.
8 schema:editor N6af6fcb2211e4b7ea803e301c84e7669
9 schema:genre chapter
10 schema:inLanguage en
11 schema:isAccessibleForFree false
12 schema:isPartOf N7c14fe0d87024b2398abbcbb4dbea4de
13 schema:name LAMBDA: A Language to Model a Database for Detection of Attacks
14 schema:pagination 197-216
15 schema:productId N0c5e384057834e67bf75e10c76066f00
16 N6d2185b31917425aaecee7d8cf84247e
17 Nfea9de98332540298136132cf42bc6a6
18 schema:publisher N693c1e78e883412e9012c6c37d4a0278
19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007204231
20 https://doi.org/10.1007/3-540-39945-3_13
21 schema:sdDatePublished 2019-04-15T19:50
22 schema:sdLicense https://scigraph.springernature.com/explorer/license/
23 schema:sdPublisher Nce77537ac54e471eaf54ee5560a1ab0f
24 schema:url http://link.springer.com/10.1007/3-540-39945-3_13
25 sgo:license sg:explorer/license/
26 sgo:sdDataset chapters
27 rdf:type schema:Chapter
28 N039a82ad55f54e36be56c0e228ae64a6 rdf:first sg:person.016707377535.37
29 rdf:rest Ned47687903604da28739608570118ea6
30 N0c5e384057834e67bf75e10c76066f00 schema:name dimensions_id
31 schema:value pub.1007204231
32 rdf:type schema:PropertyValue
33 N40973f0240ee43a7986f3d46951a1bc3 schema:name NEUROCOM, Ter Sud A - Z.I. La Plaine, 5, avenue Marcel Dassault, 31500 Toulouse, France
34 rdf:type schema:Organization
35 N693c1e78e883412e9012c6c37d4a0278 schema:location Berlin, Heidelberg
36 schema:name Springer Berlin Heidelberg
37 rdf:type schema:Organisation
38 N6af6fcb2211e4b7ea803e301c84e7669 rdf:first Nc34d26e7476542ad9e32a028184fd145
39 rdf:rest Nf335667137f94eb8a452dc43e4971487
40 N6d2185b31917425aaecee7d8cf84247e schema:name readcube_id
41 schema:value 225071ca74656b39adde3160d291d02bb0dc329a72cabb7879bb440091df30cf
42 rdf:type schema:PropertyValue
43 N7c14fe0d87024b2398abbcbb4dbea4de schema:isbn 978-3-540-39945-2
44 978-3-540-41085-0
45 schema:name Recent Advances in Intrusion Detection
46 rdf:type schema:Book
47 N9f23ab9315d54806804981fea748583c schema:familyName Wu
48 schema:givenName S. Felix
49 rdf:type schema:Person
50 Nc34d26e7476542ad9e32a028184fd145 schema:familyName Debar
51 schema:givenName Hervé
52 rdf:type schema:Person
53 Nce77537ac54e471eaf54ee5560a1ab0f schema:name Springer Nature - SN SciGraph project
54 rdf:type schema:Organization
55 Ned47687903604da28739608570118ea6 rdf:first sg:person.013363420557.32
56 rdf:rest rdf:nil
57 Nf2be86d4a8524c12b51098ada3e0868e rdf:first N9f23ab9315d54806804981fea748583c
58 rdf:rest rdf:nil
59 Nf2caa5f83c114257ab11b1b84cdd7471 schema:familyName
60 schema:givenName Ludovic
61 rdf:type schema:Person
62 Nf335667137f94eb8a452dc43e4971487 rdf:first Nf2caa5f83c114257ab11b1b84cdd7471
63 rdf:rest Nf2be86d4a8524c12b51098ada3e0868e
64 Nfea9de98332540298136132cf42bc6a6 schema:name doi
65 schema:value 10.1007/3-540-39945-3_13
66 rdf:type schema:PropertyValue
67 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
68 schema:name Information and Computing Sciences
69 rdf:type schema:DefinedTerm
70 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
71 schema:name Computer Software
72 rdf:type schema:DefinedTerm
73 sg:person.013363420557.32 schema:affiliation N40973f0240ee43a7986f3d46951a1bc3
74 schema:familyName Ortalo
75 schema:givenName Rodolphe
76 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013363420557.32
77 rdf:type schema:Person
78 sg:person.016707377535.37 schema:affiliation https://www.grid.ac/institutes/grid.4365.4
79 schema:familyName Cuppens
80 schema:givenName Frédéric
81 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016707377535.37
82 rdf:type schema:Person
83 https://doi.org/10.1109/risp.1993.287646 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094598432
84 rdf:type schema:CreativeWork
85 https://www.grid.ac/institutes/grid.4365.4 schema:alternateName Office National d'Études et de Recherches Aérospatiales
86 schema:name ONERA, Centre de Toulouse, 2, avenue Edouard Belin, 31055 Toulouse cedex 4, France
87 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...