Instrumentation of Open-Source Software for Intrusion Detection View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2007

AUTHORS

William Mahoney , William Sousan

ABSTRACT

A significant number of cyber assaults and intrusion attempts are made against open source software written in C, C++, or Java. Detecting all flaws in a large system is still a daunting, unrealistic task. The information assurance area known as ”intrusion detection” (ID) senses unauthorized access attempts by monitoring key pieces of system data. There is a desire to at least detect intrusion attempts in order to stop them while in progress, or repair the damage at a later date. Most ID systems examine system log files, or monitor network traffic. This research presents a new approach to generating records for intrusion detection by means of instrumentation. Open source code such as a web server can be compiled and the execution path of the server can be observed externally in near real-time. This method thus creates a new data source for ID which can be incorporated into a discovery system. More... »

PAGES

151-163

Book

TITLE

Runtime Verification

ISBN

978-3-540-77394-8

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13

DOI

http://dx.doi.org/10.1007/978-3-540-77395-5_13

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1009474404


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Nebraska at Omaha", 
          "id": "https://www.grid.ac/institutes/grid.266815.e", 
          "name": [
            "University of Nebraska at Omaha 282F PKI 6001 Dodge Street, Omaha Nebraska 68182-0500"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Mahoney", 
        "givenName": "William", 
        "id": "sg:person.0667471260.00", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0667471260.00"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Nebraska at Omaha", 
          "id": "https://www.grid.ac/institutes/grid.266815.e", 
          "name": [
            "University of Nebraska at Omaha 282F PKI 6001 Dodge Street, Omaha Nebraska 68182-0500"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Sousan", 
        "givenName": "William", 
        "id": "sg:person.015234355535.15", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015234355535.15"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/321239.321249", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1013145323"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/363347.363387", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1051697423"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1142/s0129054108005619", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1062896854"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2007", 
    "datePublishedReg": "2007-01-01", 
    "description": "A significant number of cyber assaults and intrusion attempts are made against open source software written in C, C++, or Java. Detecting all flaws in a large system is still a daunting, unrealistic task. The information assurance area known as \u201dintrusion detection\u201d (ID) senses unauthorized access attempts by monitoring key pieces of system data. There is a desire to at least detect intrusion attempts in order to stop them while in progress, or repair the damage at a later date. Most ID systems examine system log files, or monitor network traffic. This research presents a new approach to generating records for intrusion detection by means of instrumentation. Open source code such as a web server can be compiled and the execution path of the server can be observed externally in near real-time. This method thus creates a new data source for ID which can be incorporated into a discovery system.", 
    "editor": [
      {
        "familyName": "Sokolsky", 
        "givenName": "Oleg", 
        "type": "Person"
      }, 
      {
        "familyName": "Ta\u015f\u0131ran", 
        "givenName": "Serdar", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-77395-5_13", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-77394-8"
      ], 
      "name": "Runtime Verification", 
      "type": "Book"
    }, 
    "name": "Instrumentation of Open-Source Software for Intrusion Detection", 
    "pagination": "151-163", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-77395-5_13"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "2d21c8d271c567e44d1c1ccebabccfa290df54bb691d9687226ab174b32e5949"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1009474404"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-77395-5_13", 
      "https://app.dimensions.ai/details/publication/pub.1009474404"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T05:42", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000347_0000000347/records_89789_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-540-77395-5_13"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13'


 

This table displays all metadata directly associated to this object as RDF triples.

85 TRIPLES      23 PREDICATES      30 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-77395-5_13 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author N1acfd49aa6db4e7da5fcb21ea90bafa9
4 schema:citation https://doi.org/10.1142/s0129054108005619
5 https://doi.org/10.1145/321239.321249
6 https://doi.org/10.1145/363347.363387
7 schema:datePublished 2007
8 schema:datePublishedReg 2007-01-01
9 schema:description A significant number of cyber assaults and intrusion attempts are made against open source software written in C, C++, or Java. Detecting all flaws in a large system is still a daunting, unrealistic task. The information assurance area known as ”intrusion detection” (ID) senses unauthorized access attempts by monitoring key pieces of system data. There is a desire to at least detect intrusion attempts in order to stop them while in progress, or repair the damage at a later date. Most ID systems examine system log files, or monitor network traffic. This research presents a new approach to generating records for intrusion detection by means of instrumentation. Open source code such as a web server can be compiled and the execution path of the server can be observed externally in near real-time. This method thus creates a new data source for ID which can be incorporated into a discovery system.
10 schema:editor Na5a0b676dbe64afb86a5824403b3eb47
11 schema:genre chapter
12 schema:inLanguage en
13 schema:isAccessibleForFree false
14 schema:isPartOf N0b64ed3453234d6e8c6e4eb8711d0c20
15 schema:name Instrumentation of Open-Source Software for Intrusion Detection
16 schema:pagination 151-163
17 schema:productId N2acb89204e6b40339de31895c0c9a243
18 N8fd4be47f68a4b17ac57660ec841227a
19 Ncf0e229a28e14c6ab735526fc2c0333f
20 schema:publisher N71dde9069b9242d1872ee8abef5494a0
21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009474404
22 https://doi.org/10.1007/978-3-540-77395-5_13
23 schema:sdDatePublished 2019-04-16T05:42
24 schema:sdLicense https://scigraph.springernature.com/explorer/license/
25 schema:sdPublisher N655ac8121c48470795fc5bac14aa500b
26 schema:url https://link.springer.com/10.1007%2F978-3-540-77395-5_13
27 sgo:license sg:explorer/license/
28 sgo:sdDataset chapters
29 rdf:type schema:Chapter
30 N0b64ed3453234d6e8c6e4eb8711d0c20 schema:isbn 978-3-540-77394-8
31 schema:name Runtime Verification
32 rdf:type schema:Book
33 N1acfd49aa6db4e7da5fcb21ea90bafa9 rdf:first sg:person.0667471260.00
34 rdf:rest N3f8a7a9492ee49089be951a4b6d8e733
35 N2acb89204e6b40339de31895c0c9a243 schema:name readcube_id
36 schema:value 2d21c8d271c567e44d1c1ccebabccfa290df54bb691d9687226ab174b32e5949
37 rdf:type schema:PropertyValue
38 N3f8a7a9492ee49089be951a4b6d8e733 rdf:first sg:person.015234355535.15
39 rdf:rest rdf:nil
40 N4e0e1150731542de9660ec4a35107e22 rdf:first N569c2f38f77b401a9017020439096567
41 rdf:rest rdf:nil
42 N569c2f38f77b401a9017020439096567 schema:familyName Taşıran
43 schema:givenName Serdar
44 rdf:type schema:Person
45 N655ac8121c48470795fc5bac14aa500b schema:name Springer Nature - SN SciGraph project
46 rdf:type schema:Organization
47 N71dde9069b9242d1872ee8abef5494a0 schema:location Berlin, Heidelberg
48 schema:name Springer Berlin Heidelberg
49 rdf:type schema:Organisation
50 N8fd4be47f68a4b17ac57660ec841227a schema:name dimensions_id
51 schema:value pub.1009474404
52 rdf:type schema:PropertyValue
53 Na1b30b1ea50a4dab8f954953c072f004 schema:familyName Sokolsky
54 schema:givenName Oleg
55 rdf:type schema:Person
56 Na5a0b676dbe64afb86a5824403b3eb47 rdf:first Na1b30b1ea50a4dab8f954953c072f004
57 rdf:rest N4e0e1150731542de9660ec4a35107e22
58 Ncf0e229a28e14c6ab735526fc2c0333f schema:name doi
59 schema:value 10.1007/978-3-540-77395-5_13
60 rdf:type schema:PropertyValue
61 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
62 schema:name Information and Computing Sciences
63 rdf:type schema:DefinedTerm
64 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
65 schema:name Computer Software
66 rdf:type schema:DefinedTerm
67 sg:person.015234355535.15 schema:affiliation https://www.grid.ac/institutes/grid.266815.e
68 schema:familyName Sousan
69 schema:givenName William
70 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015234355535.15
71 rdf:type schema:Person
72 sg:person.0667471260.00 schema:affiliation https://www.grid.ac/institutes/grid.266815.e
73 schema:familyName Mahoney
74 schema:givenName William
75 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0667471260.00
76 rdf:type schema:Person
77 https://doi.org/10.1142/s0129054108005619 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062896854
78 rdf:type schema:CreativeWork
79 https://doi.org/10.1145/321239.321249 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013145323
80 rdf:type schema:CreativeWork
81 https://doi.org/10.1145/363347.363387 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051697423
82 rdf:type schema:CreativeWork
83 https://www.grid.ac/institutes/grid.266815.e schema:alternateName University of Nebraska at Omaha
84 schema:name University of Nebraska at Omaha 282F PKI 6001 Dodge Street, Omaha Nebraska 68182-0500
85 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...