LOGICAL TIME AND SPACE OF THE NETWORK INTRUSION
DOI:
https://doi.org/10.24193/subbi.2017.2.03Keywords:
Linear Logic, DDoS Attack, SYN Flood, Ludics, Logical Space, Logical Time.Abstract
Nowadays, one of the biggest threats for modern computer networks are the cyber attacks. One of the possible ways how to increase the level of computer networks security is a deployment of a network intrusion detection system. This paper deals with the behavior of the network intrusion detection system during specific network intrusion. We formally describe this network intrusion by the modal linear logic formula. Based on this formula, logical space and logical time is expressed from the attacker, and the network environment point of view in the usage of the Ludics theory.
References
J.-Y. Girard. Linear Logic, Theoretical Computer Science 50, Elsevier Science Publishers Ltd. Essex, UK, 1987
J.-Y. Girard. Linear Logic: its syntax and semantics, Laboratoire de Mathematiques Descretes, UPR 9016 - CRNS, 1995
J.-Y. Girard. Locus Solum: From the rules of logic to the logic of rules, Mathematical Structures in Computer Science, Vol. 11, N. 3, 2001
P. Innella, O. McMillan, T. Digital Integrity, LLC. An Introduction to IDS, Symantec Connect, 2001
J. Perh´aˇc, D. Mihályi. Intrusion Detection System Behavior as Resource-Oriented Formula, Acta Electrotechnica et Informatica, Vol. 15, No. 3, 2015
SANS Institute. Intrusion Detection Systems: Definition, Need and Challenges”, SANS Institute Reading Room, 2011
J. Perh´aˇc, D. Mihályi, V. Novitzká, Between Syntax and Semantics of Resource Oriented Logic for IDS Behavior Description, The Publishing Office of Czestochowa University of Technology, Journal of Applied Mathematics and Computational Mechanics, Vol. 15, No. 2, ISSN:2353-0588, 2016
J. Perh´aˇc, D. Mihályi, Coalgebraic modeling of IDS behavior, 2015 IEEE 13th International Scientific Conference on Informatics, November 18-20, 2015, Poprad, Slovakia, 2015
J. Perh´aˇc, D. Mihályi, Coalgebraic specification of network intrusion signatures, Studia Universitatis Babes-Bolyai, Informatica, Vol. 61, N. 2 pp. 83-94, 2016
J. Perh´aˇc, D. Mihályi, Intrusion Detection System Behavior as Resource-Oriented Formula, Acta Electrotechnica et Informatica. Vol. 15, N. 3, 2015, pp. 9-13. ISSN 1335-8243
W. Steingartner, A. Poláková, P. Prazňák, V. Novitzká, Linear Logic in Computer Science, Journal of Applied Mathematics and Computational Mechanics, Vol. 14(1), 91-100, 2015
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 Studia Universitatis Babeș-Bolyai Informatica
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.