Instrumentation of Open-Source Software for Intrusion Detection View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2007

AUTHORS

William Mahoney , William Sousan

ABSTRACT

A significant number of cyber assaults and intrusion attempts are made against open source software written in C, C++, or Java. Detecting all flaws in a large system is still a daunting, unrealistic task. The information assurance area known as ”intrusion detection” (ID) senses unauthorized access attempts by monitoring key pieces of system data. There is a desire to at least detect intrusion attempts in order to stop them while in progress, or repair the damage at a later date. Most ID systems examine system log files, or monitor network traffic. This research presents a new approach to generating records for intrusion detection by means of instrumentation. Open source code such as a web server can be compiled and the execution path of the server can be observed externally in near real-time. This method thus creates a new data source for ID which can be incorporated into a discovery system. More... »

PAGES

151-163

Book

TITLE

Runtime Verification

ISBN

978-3-540-77394-8

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13

DOI

http://dx.doi.org/10.1007/978-3-540-77395-5_13

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1009474404


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Nebraska at Omaha", 
          "id": "https://www.grid.ac/institutes/grid.266815.e", 
          "name": [
            "University of Nebraska at Omaha 282F PKI 6001 Dodge Street, Omaha Nebraska 68182-0500"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Mahoney", 
        "givenName": "William", 
        "id": "sg:person.0667471260.00", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0667471260.00"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Nebraska at Omaha", 
          "id": "https://www.grid.ac/institutes/grid.266815.e", 
          "name": [
            "University of Nebraska at Omaha 282F PKI 6001 Dodge Street, Omaha Nebraska 68182-0500"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Sousan", 
        "givenName": "William", 
        "id": "sg:person.015234355535.15", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015234355535.15"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/321239.321249", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1013145323"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/363347.363387", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1051697423"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1142/s0129054108005619", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1062896854"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2007", 
    "datePublishedReg": "2007-01-01", 
    "description": "A significant number of cyber assaults and intrusion attempts are made against open source software written in C, C++, or Java. Detecting all flaws in a large system is still a daunting, unrealistic task. The information assurance area known as \u201dintrusion detection\u201d (ID) senses unauthorized access attempts by monitoring key pieces of system data. There is a desire to at least detect intrusion attempts in order to stop them while in progress, or repair the damage at a later date. Most ID systems examine system log files, or monitor network traffic. This research presents a new approach to generating records for intrusion detection by means of instrumentation. Open source code such as a web server can be compiled and the execution path of the server can be observed externally in near real-time. This method thus creates a new data source for ID which can be incorporated into a discovery system.", 
    "editor": [
      {
        "familyName": "Sokolsky", 
        "givenName": "Oleg", 
        "type": "Person"
      }, 
      {
        "familyName": "Ta\u015f\u0131ran", 
        "givenName": "Serdar", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-77395-5_13", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-77394-8"
      ], 
      "name": "Runtime Verification", 
      "type": "Book"
    }, 
    "name": "Instrumentation of Open-Source Software for Intrusion Detection", 
    "pagination": "151-163", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-77395-5_13"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "2d21c8d271c567e44d1c1ccebabccfa290df54bb691d9687226ab174b32e5949"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1009474404"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-77395-5_13", 
      "https://app.dimensions.ai/details/publication/pub.1009474404"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T05:42", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000347_0000000347/records_89789_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-540-77395-5_13"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77395-5_13'


 

This table displays all metadata directly associated to this object as RDF triples.

85 TRIPLES      23 PREDICATES      30 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-77395-5_13 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author N581bd6cf88cc4c41878fbe34804fa607
4 schema:citation https://doi.org/10.1142/s0129054108005619
5 https://doi.org/10.1145/321239.321249
6 https://doi.org/10.1145/363347.363387
7 schema:datePublished 2007
8 schema:datePublishedReg 2007-01-01
9 schema:description A significant number of cyber assaults and intrusion attempts are made against open source software written in C, C++, or Java. Detecting all flaws in a large system is still a daunting, unrealistic task. The information assurance area known as ”intrusion detection” (ID) senses unauthorized access attempts by monitoring key pieces of system data. There is a desire to at least detect intrusion attempts in order to stop them while in progress, or repair the damage at a later date. Most ID systems examine system log files, or monitor network traffic. This research presents a new approach to generating records for intrusion detection by means of instrumentation. Open source code such as a web server can be compiled and the execution path of the server can be observed externally in near real-time. This method thus creates a new data source for ID which can be incorporated into a discovery system.
10 schema:editor Nffc4fc7f7a364beb9936f7d3a39e2b49
11 schema:genre chapter
12 schema:inLanguage en
13 schema:isAccessibleForFree false
14 schema:isPartOf Neeb9c88165f44ab8851de51ac3589068
15 schema:name Instrumentation of Open-Source Software for Intrusion Detection
16 schema:pagination 151-163
17 schema:productId N1fd226f7f3eb488aa0f70f6f5b699603
18 N3b14c129ffa64a7283042da3c665ef85
19 N53e26719d008420297bebf37c690d4c9
20 schema:publisher N9df3b43b72d249248a5322a9378f98b0
21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009474404
22 https://doi.org/10.1007/978-3-540-77395-5_13
23 schema:sdDatePublished 2019-04-16T05:42
24 schema:sdLicense https://scigraph.springernature.com/explorer/license/
25 schema:sdPublisher N6e6d31a3cbce4f0a97544c62feb69404
26 schema:url https://link.springer.com/10.1007%2F978-3-540-77395-5_13
27 sgo:license sg:explorer/license/
28 sgo:sdDataset chapters
29 rdf:type schema:Chapter
30 N1fd226f7f3eb488aa0f70f6f5b699603 schema:name dimensions_id
31 schema:value pub.1009474404
32 rdf:type schema:PropertyValue
33 N25e6f89f321c4c4bb3a0324cc966c2e9 rdf:first N72aecc97e2914750bf340f10f986d673
34 rdf:rest rdf:nil
35 N3b14c129ffa64a7283042da3c665ef85 schema:name doi
36 schema:value 10.1007/978-3-540-77395-5_13
37 rdf:type schema:PropertyValue
38 N53e26719d008420297bebf37c690d4c9 schema:name readcube_id
39 schema:value 2d21c8d271c567e44d1c1ccebabccfa290df54bb691d9687226ab174b32e5949
40 rdf:type schema:PropertyValue
41 N581bd6cf88cc4c41878fbe34804fa607 rdf:first sg:person.0667471260.00
42 rdf:rest N8f7d4ef7851e45eca379ef0444c804a2
43 N6e6d31a3cbce4f0a97544c62feb69404 schema:name Springer Nature - SN SciGraph project
44 rdf:type schema:Organization
45 N72aecc97e2914750bf340f10f986d673 schema:familyName Taşıran
46 schema:givenName Serdar
47 rdf:type schema:Person
48 N8f7d4ef7851e45eca379ef0444c804a2 rdf:first sg:person.015234355535.15
49 rdf:rest rdf:nil
50 N9df3b43b72d249248a5322a9378f98b0 schema:location Berlin, Heidelberg
51 schema:name Springer Berlin Heidelberg
52 rdf:type schema:Organisation
53 Nea962dbe7e8d49db856f978732ab4c5b schema:familyName Sokolsky
54 schema:givenName Oleg
55 rdf:type schema:Person
56 Neeb9c88165f44ab8851de51ac3589068 schema:isbn 978-3-540-77394-8
57 schema:name Runtime Verification
58 rdf:type schema:Book
59 Nffc4fc7f7a364beb9936f7d3a39e2b49 rdf:first Nea962dbe7e8d49db856f978732ab4c5b
60 rdf:rest N25e6f89f321c4c4bb3a0324cc966c2e9
61 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
62 schema:name Information and Computing Sciences
63 rdf:type schema:DefinedTerm
64 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
65 schema:name Computer Software
66 rdf:type schema:DefinedTerm
67 sg:person.015234355535.15 schema:affiliation https://www.grid.ac/institutes/grid.266815.e
68 schema:familyName Sousan
69 schema:givenName William
70 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015234355535.15
71 rdf:type schema:Person
72 sg:person.0667471260.00 schema:affiliation https://www.grid.ac/institutes/grid.266815.e
73 schema:familyName Mahoney
74 schema:givenName William
75 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0667471260.00
76 rdf:type schema:Person
77 https://doi.org/10.1142/s0129054108005619 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062896854
78 rdf:type schema:CreativeWork
79 https://doi.org/10.1145/321239.321249 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013145323
80 rdf:type schema:CreativeWork
81 https://doi.org/10.1145/363347.363387 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051697423
82 rdf:type schema:CreativeWork
83 https://www.grid.ac/institutes/grid.266815.e schema:alternateName University of Nebraska at Omaha
84 schema:name University of Nebraska at Omaha 282F PKI 6001 Dodge Street, Omaha Nebraska 68182-0500
85 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...