Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic

  • Authors:
  • Nora Cuppens-Boulahia;Frédéric Cuppens

  • Affiliations:
  • TELECOM Bretagne, Cesson Sévigné Cedex, France 35512;TELECOM Bretagne, Cesson Sévigné Cedex, France 35512

  • Venue:
  • DEON '08 Proceedings of the 9th international conference on Deontic Logic in Computer Science
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control requirements and more recently on authentication and usage control requirements. Specifying administration and delegation policies is also an important issue, especially in the context of pervasive distributed systems. In this paper, we are investigating the new issue of modelling intrusion detection and reaction policies and study the appropriateness of using deontic logic for this purpose. We analyze how intrusion detection requirements may be specified to face known intrusions but also new intrusions. In the case of new intrusions, we suggest using the bring it aboutmodality and specifying requirements as prohibitions to bring it about that some security objectives are violated. When some intrusions occur, the security policy to be complete should specify what happens in this case. This is what we call a reaction policy. The paper shows that this part of the policy corresponds to contrary to dutyrequirements and suggests an approach based on assigning priority to activation contexts of security requirements.