Abstract
We present a novel approach to the runtime monitoring of network traffic where from a high-level specification of security properties an executable monitor is generated; this monitor observes the network traffic in real time for violation of the specified properties in order to report respectively prevent these violations. The specification formalism is purely based on the classical notions of predicate logic and set theory with the corresponding level of expressiveness; compared to other more restricted formalisms it has thus much stronger capabilities to describe properties of interest. Its high level of flexibility makes our approach also applicable to other problem areas and engineering domains such as process control where it is important to guarantee that sequences of events conform to a particular protocol.
| Original language | English |
|---|---|
| Title of host publication | Embedded world Conference 2015, February 24-26 2015, Nürnberg, Germany |
| Editors | Matthias Sturm et al. |
| Place of Publication | Haar, Germany |
| Publisher | Design & Elektronik |
| Number of pages | 9 |
| ISBN (Print) | 978-3-645-50144-6 |
| Publication status | Published - Feb 2015 |
Fields of science
- 101 Mathematics
- 101001 Algebra
- 101005 Computer algebra
- 101009 Geometry
- 101012 Combinatorics
- 101013 Mathematical logic
- 101020 Technical mathematics
JKU Focus areas
- Computation in Informatics and Mathematics