Show simple item record

dc.contributor.authorRahul, Ranjan
dc.contributor.otherQueen's University (Kingston, Ont.). Theses (Queen's University (Kingston, Ont.))en
dc.date.accessioned2017-11-09T22:02:17Z
dc.date.available2017-11-09T22:02:17Z
dc.identifier.urihttp://hdl.handle.net/1974/23645
dc.description.abstractIn this thesis, we have extended the SCL (Structured and Context Language) network protocol description language to describe the complex constraints for the network engineer. Previous SCL developed with the focus of penetration testing and not sufficient for constraint scenarios. The constraint scenarios include multiple-packet with order and environmental information. To address the current limitation of the SCL, we have proposed syntaxes which are declarative in nature. We have studied three different styles of syntaxes to handle constraint scenarios of an IDS (Intrusion detection system). The three syntaxes are based on Java expressions, QUEL and Prolog. We have represented three constraints for command and control systems such as ATC (Air Traffic Control) network using our syntaxes. The same constraints have been previously used by a constraint engine to demonstrate the capability of the IDS. We evaluate each of the syntax based on the four design guidelines for the domain specific language (DSL). The Java-based syntax shows better capability to represent constraints based on four DSL design guidelines. Finally, we show the mapping of the constraints represented in our syntaxes with the low-level DSL (Domain Specific Language) of the constraint engine. The mapping shows our syntaxes has all relevant information to translate into the low-level DSL.en_US
dc.language.isoenen_US
dc.relation.ispartofseriesCanadian thesesen
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rightsQueen's University's Thesis/Dissertation Non-Exclusive License for Deposit to QSpace and Library and Archives Canadaen
dc.rightsProQuest PhD and Master's Theses International Dissemination Agreementen
dc.rightsIntellectual Property Guidelines at Queen's Universityen
dc.rightsCopying and Preserving Your Thesisen
dc.rightsThis publication is made available by the authority of the copyright owner solely for the purpose of private study and research and may not be copied or reproduced except as permitted by the copyright laws without written authority from the copyright owner.en
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectLanguage Designen_US
dc.subjectSecurityen_US
dc.subjectNetwork Protocolen_US
dc.titleAn SCL-Based Constraint Representation Language for Intrusion Detectionen_US
dc.typeThesisen
dc.description.degreeMaster of Scienceen_US
dc.contributor.supervisorDean, Thomas
dc.contributor.departmentComputingen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 United States
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States