Network Monitoring with Constraint Programming: Preliminary Specification and Analysis

Network Monitoring and Intrusion Detection Systems plays an important role in today's computer networks health, allowing the diagnosis and detection of anomalous situations on the network that could damage the performance and put the security of users data in risk if not detected or diagnosed in time to take any necessary measures. In this paper we present a preliminary specification and analysis of a network monitoring and intrusion detection concept system based on constraint programming, implemented on several constraint solver systems. This concept allows to describe the desirable network situations through constraints on network entities, allowing a more expressive and clear way of describing network situations.

[1]  Philippe Codognet,et al.  Parallel local search for solving Constraint Problems on the Cell Broadband Engine (Preliminary Results) , 2009, LSCS.

[2]  Wolfgang Barth,et al.  Nagios: System and Network Monitoring , 2006 .

[3]  James C. Foster,et al.  Intrusion Detection Systems , 2004 .

[4]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[5]  Krzysztof R. Apt,et al.  Principles of constraint programming , 2003 .

[6]  Mark Wallace,et al.  Principles and Practice of Constraint Programming – CP 2004 , 2004, Lecture Notes in Computer Science.

[7]  Peter J. Stuckey,et al.  Speeding Up Constraint Propagation , 2004, CP.

[8]  H. Peter Hofstee,et al.  Introduction to the Cell multiprocessor , 2005, IBM J. Res. Dev..

[9]  Christian Schulte,et al.  Programming Constraint Services , 2002, Lecture Notes in Computer Science.

[10]  Arie van Deursen,et al.  Domain-specific languages: an annotated bibliography , 2000, SIGP.

[11]  Philippe Codognet,et al.  Yet Another Local Search Method for Constraint Solving , 2001, SAGA.

[12]  Toby Walsh,et al.  Handbook of Constraint Programming , 2006, Handbook of Constraint Programming.

[13]  Philippe Codognet,et al.  Design and Implementation of the GNU Prolog System , 2001, J. Funct. Log. Program..

[14]  Jay Beale,et al.  Snort 2.1 Intrusion Detection, Second Edition , 2004 .

[15]  Bart Demoen,et al.  Heap Memory Management in Prolog with Tabling: Principles and Practice , 2001, J. Funct. Log. Program..

[16]  Mats Carlsson,et al.  An Open-Ended Finite Domain Constraint Solver , 1997, PLILP.

[17]  Kathleen Steinhöfel,et al.  Stochastic Algorithms: Foundations and Applications , 2001, Lecture Notes in Computer Science.

[18]  Richard C. Harlan Network management with Nagios , 2003 .

[19]  Christian Schulte Programming Constraint Services: High-Level Programming of Standard and New Constraint Services , 2002 .