LAMBDA: A Language to Model a Database for Detection of Attacks View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2000

AUTHORS

Frédéric Cuppens , Rodolphe Ortalo

ABSTRACT

This article presents an attack description language. This language is based on logic and uses a declarative approach. In the language, the conditions and effects of an attack are described with logical formulas related to the state of the target computer system. The various steps of the attack process are associated to events, which may be combined using specific algebraic operators. These elements provide a description of the attack from the point of view of the attacker. They are complemented with additional elements corresponding to the point of view of intrusion detection systems and audit programs. These detection and verification aspects provide the language user with means to tailor the description of the attack to the needs of a specific intrusion detection system or a specific environment. More... »

PAGES

197-216

Book

TITLE

Recent Advances in Intrusion Detection

ISBN

978-3-540-41085-0
978-3-540-39945-2

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13

DOI

http://dx.doi.org/10.1007/3-540-39945-3_13

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1007204231


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Office National d'\u00c9tudes et de Recherches A\u00e9rospatiales", 
          "id": "https://www.grid.ac/institutes/grid.4365.4", 
          "name": [
            "ONERA, Centre de Toulouse, 2, avenue Edouard Belin, 31055\u00a0Toulouse cedex 4, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Cuppens", 
        "givenName": "Fr\u00e9d\u00e9ric", 
        "id": "sg:person.016707377535.37", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016707377535.37"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "NEUROCOM, Ter Sud A - Z.I. La Plaine, 5, avenue Marcel Dassault, 31500\u00a0Toulouse, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ortalo", 
        "givenName": "Rodolphe", 
        "id": "sg:person.013363420557.32", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013363420557.32"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1109/risp.1993.287646", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094598432"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2000", 
    "datePublishedReg": "2000-01-01", 
    "description": "This article presents an attack description language. This language is based on logic and uses a declarative approach. In the language, the conditions and effects of an attack are described with logical formulas related to the state of the target computer system. The various steps of the attack process are associated to events, which may be combined using specific algebraic operators. These elements provide a description of the attack from the point of view of the attacker. They are complemented with additional elements corresponding to the point of view of intrusion detection systems and audit programs. These detection and verification aspects provide the language user with means to tailor the description of the attack to the needs of a specific intrusion detection system or a specific environment.", 
    "editor": [
      {
        "familyName": "Debar", 
        "givenName": "Herv\u00e9", 
        "type": "Person"
      }, 
      {
        "familyName": "M\u00e9", 
        "givenName": "Ludovic", 
        "type": "Person"
      }, 
      {
        "familyName": "Wu", 
        "givenName": "S. Felix", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-39945-3_13", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-41085-0", 
        "978-3-540-39945-2"
      ], 
      "name": "Recent Advances in Intrusion Detection", 
      "type": "Book"
    }, 
    "name": "LAMBDA: A Language to Model a Database for Detection of Attacks", 
    "pagination": "197-216", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-39945-3_13"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "225071ca74656b39adde3160d291d02bb0dc329a72cabb7879bb440091df30cf"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1007204231"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-39945-3_13", 
      "https://app.dimensions.ai/details/publication/pub.1007204231"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T19:50", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8687_00000012.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/3-540-39945-3_13"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-39945-3_13'


 

This table displays all metadata directly associated to this object as RDF triples.

87 TRIPLES      23 PREDICATES      28 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-39945-3_13 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author N3f42090d057d4149bac3a7607b129693
4 schema:citation https://doi.org/10.1109/risp.1993.287646
5 schema:datePublished 2000
6 schema:datePublishedReg 2000-01-01
7 schema:description This article presents an attack description language. This language is based on logic and uses a declarative approach. In the language, the conditions and effects of an attack are described with logical formulas related to the state of the target computer system. The various steps of the attack process are associated to events, which may be combined using specific algebraic operators. These elements provide a description of the attack from the point of view of the attacker. They are complemented with additional elements corresponding to the point of view of intrusion detection systems and audit programs. These detection and verification aspects provide the language user with means to tailor the description of the attack to the needs of a specific intrusion detection system or a specific environment.
8 schema:editor N469c1faa590c4e74bf60f259ada8daa3
9 schema:genre chapter
10 schema:inLanguage en
11 schema:isAccessibleForFree false
12 schema:isPartOf N3b45a9bd7efc40acae8f5d9a03ff9705
13 schema:name LAMBDA: A Language to Model a Database for Detection of Attacks
14 schema:pagination 197-216
15 schema:productId N46ff27cfd30a4152b06ec35c8a249f10
16 N6162f67d2e4f4b989ea600c7ec7d772e
17 N8218af5efd28461385cb5c0011b3e8ad
18 schema:publisher Nea30b8a60956426ca788de0de1ffeb68
19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007204231
20 https://doi.org/10.1007/3-540-39945-3_13
21 schema:sdDatePublished 2019-04-15T19:50
22 schema:sdLicense https://scigraph.springernature.com/explorer/license/
23 schema:sdPublisher N3166da223dd84b9f90dffe0f4a09bbff
24 schema:url http://link.springer.com/10.1007/3-540-39945-3_13
25 sgo:license sg:explorer/license/
26 sgo:sdDataset chapters
27 rdf:type schema:Chapter
28 N2f867794d16f45419f377727b00ee584 schema:name NEUROCOM, Ter Sud A - Z.I. La Plaine, 5, avenue Marcel Dassault, 31500 Toulouse, France
29 rdf:type schema:Organization
30 N3166da223dd84b9f90dffe0f4a09bbff schema:name Springer Nature - SN SciGraph project
31 rdf:type schema:Organization
32 N3b45a9bd7efc40acae8f5d9a03ff9705 schema:isbn 978-3-540-39945-2
33 978-3-540-41085-0
34 schema:name Recent Advances in Intrusion Detection
35 rdf:type schema:Book
36 N3f42090d057d4149bac3a7607b129693 rdf:first sg:person.016707377535.37
37 rdf:rest N61614b43b2e2419689148322608705f1
38 N469c1faa590c4e74bf60f259ada8daa3 rdf:first N7e487fad85d744e88bdc0913ca2b45e8
39 rdf:rest N8b4b02b91074471eab9032694df57b5e
40 N46ff27cfd30a4152b06ec35c8a249f10 schema:name dimensions_id
41 schema:value pub.1007204231
42 rdf:type schema:PropertyValue
43 N61614b43b2e2419689148322608705f1 rdf:first sg:person.013363420557.32
44 rdf:rest rdf:nil
45 N6162f67d2e4f4b989ea600c7ec7d772e schema:name readcube_id
46 schema:value 225071ca74656b39adde3160d291d02bb0dc329a72cabb7879bb440091df30cf
47 rdf:type schema:PropertyValue
48 N67b396332e0d43ffb20f24d74f3ca5f8 schema:familyName Wu
49 schema:givenName S. Felix
50 rdf:type schema:Person
51 N7e487fad85d744e88bdc0913ca2b45e8 schema:familyName Debar
52 schema:givenName Hervé
53 rdf:type schema:Person
54 N8218af5efd28461385cb5c0011b3e8ad schema:name doi
55 schema:value 10.1007/3-540-39945-3_13
56 rdf:type schema:PropertyValue
57 N8b4b02b91074471eab9032694df57b5e rdf:first Nadc0c47cfe294c888f774645acac50df
58 rdf:rest Nd3ec4dc624894a6b9fdc74a6ad3dc008
59 Nadc0c47cfe294c888f774645acac50df schema:familyName
60 schema:givenName Ludovic
61 rdf:type schema:Person
62 Nd3ec4dc624894a6b9fdc74a6ad3dc008 rdf:first N67b396332e0d43ffb20f24d74f3ca5f8
63 rdf:rest rdf:nil
64 Nea30b8a60956426ca788de0de1ffeb68 schema:location Berlin, Heidelberg
65 schema:name Springer Berlin Heidelberg
66 rdf:type schema:Organisation
67 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
68 schema:name Information and Computing Sciences
69 rdf:type schema:DefinedTerm
70 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
71 schema:name Computer Software
72 rdf:type schema:DefinedTerm
73 sg:person.013363420557.32 schema:affiliation N2f867794d16f45419f377727b00ee584
74 schema:familyName Ortalo
75 schema:givenName Rodolphe
76 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013363420557.32
77 rdf:type schema:Person
78 sg:person.016707377535.37 schema:affiliation https://www.grid.ac/institutes/grid.4365.4
79 schema:familyName Cuppens
80 schema:givenName Frédéric
81 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016707377535.37
82 rdf:type schema:Person
83 https://doi.org/10.1109/risp.1993.287646 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094598432
84 rdf:type schema:CreativeWork
85 https://www.grid.ac/institutes/grid.4365.4 schema:alternateName Office National d'Études et de Recherches Aérospatiales
86 schema:name ONERA, Centre de Toulouse, 2, avenue Edouard Belin, 31055 Toulouse cedex 4, France
87 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...