Continuous Assessment of a Unix Configuration: Integrating Intrusion Detection and Configuration Analysis

  • Authors:
  • Abdelaziz Mounji;Baudouin Le Charlier

  • Affiliations:
  • -;-

  • Venue:
  • SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
  • Year:
  • 1997

Quantified Score

Hi-index 0.00

Visualization

Abstract

Computer security is a topic of growing concern because, on the one hand, the power of computers continues to increase at exponential speed and all computers are virtually connected to each other and because, on the other hand, the lack of reliability of software systems may cause dramatic and unrecoverable damage to computer systems and hence to the newly emerging computerized society. Among the possible approaches to improve the current situation, expert systems have been advocated to be an important one. Typical tasks that such expert systems attempt to achieve include finding system vulnerabilities and detecting malicious behaviors of users.In this paper, we extend our intrusion detection system ASAX with a deductive subsystem that allows us to assess the security level of a software configuration on a real time basis. By coupling the two subsystems --- intrusion detection and configuration analysis --- we moreover achieve a better tuning of the intrusion detection since the system has only to enable intrusion detection rules that are specifically required by the current state of the configuration. We also report some preliminary performance measurements, which suggest that our approach can be practical in real life contexts.