2 research outputs found
Private networks intrusion detection system by satisfying network constraints
The great development of newer technologies also carries an important growth in the number of malicious attacks [1]. Even private networks without external Internet connections suffer from those attacks. These private networks play a crucial role in the country’s security. Imagine the consequences of turning the power of an entire city down or a denial of service [2] in an air traffic control system. Because of this fact, numerous politicians, including the recently named United States of America’s president, Donald Trump, are seriously taking into consideration the huge importance of protecting the private networks from intrusions in order to assure their countries’ peace. Some people even believe that efficient Intrusion Detection Systems (IDS) [3] could be a good protection against a possible Third World War. Thus, new and more powerful security solutions need to be developed to protect our organizations’ systems
Packet Decoding using Context Sensitive Parsing
Queen’s that applies program transformation techniques to protocol data to evaluate the security of network applications. As part of this process, binary protocols are translated into a textual representation. This paper describes a translation process using a context sensitive parser that eliminates the need to write custom code to decode each individual protocol. It is a template driven top down parser augmented by a constraint engine. The constraint engine is used to implemen