next up previous contents
Next: 4. Adaptive security system Up: 3.2 Use of formal Previous: 3.2 Use of formal

Example

An employee (user_A) logs on to his workstation (host_1) and opens an FTP connection to a server called ftp.chips.com, accessed through a gateway (GW) that connects the organization's intranet to the outside world. The login process checks the user's credentials and the host's computer monitor notifies the computer security engine from the security management service of a successful login attempt. Additional processing can be done if the entry [user_A, host_1] of the access control condition matrix contains an access control condition vector (see figure 3.5). The security engine may wish to forward this event to the correlation engine that in turn interacts with other engines to detect anomalies by fitting various pieces of information together.

The system now knows that that particular user is present on the system. Next, the network monitor observes a stream of TCP/IP packets. It starts registering a session originating from the host. The network security engine is provided with event information and can check if certain rules apply to the source, destination and context of the connection. Entry [host_1, GW] is entered in the matrix. Rules that may apply with respect to the source (the subject), as indicated by the control conditions, may execute procedural logic depending on:

Rules that are relevant to the destination address:

Contextual information could exist of:



Footnotes

...
Notice that we have to distinguish between authenticating a computer host and the user at the application level.
... engine)3.3

next up previous contents
Next: 4. Adaptive security system Up: 3.2 Use of formal Previous: 3.2 Use of formal
(c) 1998, Filip Schepers