We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Formal Framework for Intrusion Detection within an Information System based on Workflow Audit

by Atsa Etoundi Roger, Nkoulou Onanena Georges, Nkondock Mi Bahanag Nicolas, Mboupda Moyo Achille
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 81 - Number 1
Year of Publication: 2013
Authors: Atsa Etoundi Roger, Nkoulou Onanena Georges, Nkondock Mi Bahanag Nicolas, Mboupda Moyo Achille
10.5120/13973-1964

Atsa Etoundi Roger, Nkoulou Onanena Georges, Nkondock Mi Bahanag Nicolas, Mboupda Moyo Achille . A Formal Framework for Intrusion Detection within an Information System based on Workflow Audit. International Journal of Computer Applications. 81, 1 ( November 2013), 1-10. DOI=10.5120/13973-1964

@article{ 10.5120/13973-1964,
author = { Atsa Etoundi Roger, Nkoulou Onanena Georges, Nkondock Mi Bahanag Nicolas, Mboupda Moyo Achille },
title = { A Formal Framework for Intrusion Detection within an Information System based on Workflow Audit },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 81 },
number = { 1 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume81/number1/13973-1964/ },
doi = { 10.5120/13973-1964 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:54.932153+05:30
%A Atsa Etoundi Roger
%A Nkoulou Onanena Georges
%A Nkondock Mi Bahanag Nicolas
%A Mboupda Moyo Achille
%T A Formal Framework for Intrusion Detection within an Information System based on Workflow Audit
%J International Journal of Computer Applications
%@ 0975-8887
%V 81
%N 1
%P 1-10
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays information systems are very critical and important as their various users are distributed around the world. The role played by the information system in the evolution of the society has led to a new form of economy, the leaders in this economy are those who will be able to master their information system in terms of security issues. Based on the quality of data managed in the information system for decision making, the security issue becomes more and more crucial. Among the challenges that are faced in the information system, it appears that the intrusion detection problem is the major challenge that needs to be discussed first as all attacks start with the intrusion which precedes various malicious activities. Many works had been done in this domain but the intrusion detection problem is still an open research topic in computer science. In this paper, the described problem is considered as an engineering one. The approach used in this research is based on the workflow theory which allows carrying out an efficient identification in different activities that are able to be performed. The defined approach is focused on a formal and sound description of resources that participate in the execution of identified activities. The result of this paper is the definition of a formal framework for intrusion detection based on workflow execution analysis.

References
  1. Karthikeyan . K. R and A. Indra: "Intrusion Detection Tools and Techniques - A Survey". International Journal of Computer Theory and Engineering, Vol. 2, No. 6, December, 2010.
  2. Heady, R. , G. Luger, A. Maccabe, and M. Servi lia: "The Architecture of a Network Level Intrusion Detection System". Technical report, Computer Science Department, University of New Mexico, 1990.
  3. Lunt, T. : "Detecting Intruders in Computer Systems". In: Proceedings of the 1993 Conference on Auditing and Computer Technology, 1993.
  4. Kumar, S. and E. H. Spafford: "A Software Architecture to Support Misuse Intrusion Detection". In: Proceedings of the lSth National Information Security Conference, 1995.
  5. A. Kartit, A. Saidi, F. Bezzazi, M. El marraki, A. Radi: "A new approach to intrusion detection system". Journal of Theoretical and Applied Information Technology, 29th February 2012. Vol. 36 No. 2, ISSN: 1992-8645, www. jatit. org, EISSN: 1817-3195.
  6. W. M. P. van der Aalst, A. J. M. M. Weijters, and L. Maruster: "Workflow Mining: Discovering Process Models from Event Logs". IEEE Transactions on Knowledge and Data Engineering (TKDE), Accepted for publication, 2003.
  7. W. M. P. van der Aalst, B. F. van Dongen, J. Herbst, L. Marusterl, G. Schimm, and AJ. M. M. Weijters: "Workow Mining: A Survey of issues and Approaches". Data and Knowledge Engineering, Accepted for publication, 2003.
  8. Ilgun, K. , R. A. Kemmerer, and P. A. Porras: "State Transition Analysis: A Rule-Based lntrusion Detection Approach". IEEE Transactions on Software Engineering 21(3), 1995.
  9. Jorg Becker, Patrick Delfmann: "Reference modeling: Efficient Information System Design Through Reuse of Information Models". Kindle Edition, Jul 2007.
  10. Atsa Etoundi Roger: "ATSERO Method: A Guideline for Business Process and Workflow Modeling Within an Enterprise ". International Journal of Scientific Engineering Research, Dec 2011.
  11. Bob Glushko: "Process Modeling for Information System Design". Oct 2008.
  12. Sandy Kemsley: "Business Process Modeling". TIBCO Software Inc, global headquarters, 3303 hillview avenue, Palo alto, ca 94304, 2011.
  13. Rafael Accorsi, Thomas Stocker, Gnter Mller: "On the Exploitation of Process Mining for Security Audits: The Process Discovery Case". SAC '13 Proceedings of the 28th Annual ACM Symposium on Applied Computing, Pages 1462-1468, ACM New York, NY, USA 2013.
  14. Mohammad Sazzadul Hoque, Abdul Mukit, Abu Naser Bikas: "An implementation of intrusion detection system using genetic algorithm". International Journal of Network Security and Its Applications (IJNSA), Vol. 4, No. 2, March 2012.
  15. Bharat S. Dhak, Shrikant Lade: "An Evolutionary Approach to Intrusion Detection System using Genetic Algorithm". International Journal of Emerging Technology and AdvancedEngineering. ISSN 2250-2459, ISO 9001:2008, Certified Journal, Volume 2, Issue 12, December 2012.
  16. A. A. Ojugo, A. O. Eboka, O. E. Okonta, R. E Yoro, F. O. Aghware: "Genetic Algorithm Rule-Based Intrusion Detection System (GAIDS)". Journal of Emerging Trends in Computing and Information Sciences, VOL. 3, NO. 8 Aug, 2012 ISSN 2079-8407.
  17. Qinglei Zhou, Yilin Zhao: "The Design and Implementation of Intrusion Detection System based on Data Mining Technology". Research Journal of Applied Sciences, Engineering and Technology 5(14): 3824-3829, 2013 ISSN: 2040-7459; e-ISSN: 2040-7467, Maxwell Scientific Organization, 2013.
  18. Yogita B. Bhavsar, Kalyani C. Waghmare: "Intrusion Detection System Using Data Mining Technique: Support Vector Machine " International Journal of Emerging Technology and Advanced Engineering, Website: www. ijetae. com, ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 3, March 2013.
  19. Parekh s. p, Madan b. s, Tugnayat r. m: "Approach for intrusion detection system using data mining", Journal of Data Mining and Knowledge Discovery ISSN: 22296662, and ISSN: 22296670, Volume 3, Issue 2, 2012, pp. -83-87.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection model Workflow execution audit Information system audit Activity categorization