Plan-based simulation of malicious intruders on a computer system [electronic resource]
Roberts, Christopher C.
Rowe, Neil C.
MetadataShow full item record
The problem addressed by this work was to reduce the time taken to train system administrators in detecting computer security problems in system audit logs. The approach taken was to develop a simulator which generates realistic audit logs that illustrate both non-malicious and malicious behavior. These logs can be used to train system administrators. The simulator was written in Prolog and used means-ends analysis to simulate seventeen combinations of general system functions which includes the following: logins, editing, file deletions, file copying, changing file access rights, obtaining superuser privileges, sending mail and logouts. The simulation manipulates virtual system files analogously to what real users do. This creates realistic audit file logs that include a mixture of normal and malicious activity. More impressive is that the entire source program requires only 19.1 kbytes of space, making it small enough to be compatible with a personal computer.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Sellers, Kristin R. (Monterey, California: Naval Postgraduate School, 2016-09);Computer systems continue to be at risk of attack by malicious software that are attached to email. Email has been determined to be the cause of 80% of computer virus infections. Millions of dollars are lost yearly due to ...
A software assurance framework for mitigating the risks of malicious software in embedded systems used in aircraft Ginn, Robert C. (Monterey, California. Naval Postgraduate School, 2011-09);techniques that can be used to detect malicious code in individual aircraft Weapons Replaceable Assemblies (WRAs)
Assessing the Consequence of Cyber and Physical Malicious Attacks in Complex, Cyber-Physical Systems During Early System Design O’Halloran, Bryan M.; Papakonstantinou, Nikolaos; Van Bossuyt, Douglas L. (IEEE, 2018);This research contributes to the lifecycle assessment of complex cyber-physical systems (CCPSs) to better understand and mitigate risks of malicious attacks through design. This assessment capability is proposed during the ...