Authors
Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lutz
Publication date
2002/12/1
Journal
Requirements Engineering
Volume
7
Issue
4
Pages
207-220
Publisher
Springer-Verlag London Limited
Description
Requirements analysis for an intrusion detection system (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collection of mobile agents that detect, classify, and correlate system and network activities, the derived requirements include what activities the agent software should monitor, what intrusion characteristics the agents should correlate, where the IDS agents should be placed to feasibly detect the intrusions, and what countermeasures the software should initiate. This paper describes the use of software fault trees for requirements identification and analysis in an IDS. Intrusions are divided into seven stages (following Ruiu), and a fault subtree is developed to model each of the seven stages (reconnaissance, penetration, etc.). Two examples are provided. This approach was found to support requirements evolution (as new intrusions were identified …
Total citations
2001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202337175815111112101081177712645522
Scholar articles
G Helmer, J Wong, M Slagell, V Honavar, L Miller… - Requirements Engineering, 2002