Sciweavers

53 search results - page 1 / 11
» Formal Specification of Intrusion Signatures and Detection R...
Sort
View
CSFW
2002
IEEE
14 years 4 months ago
Formal Specification of Intrusion Signatures and Detection Rules
Jean-Philippe Pouzol, Mireille Ducassé
SPIN
2009
Springer
14 years 5 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
DMIN
2006
141views Data Mining» more  DMIN 2006»
14 years 11 days ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
EUROSEC
2010
ACM
14 years 4 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
CAV
2005
Springer
139views Hardware» more  CAV 2005»
14 years 4 months ago
The Orchids Intrusion Detection Tool
ORCHIDS is an intrusion detection tool based on techniques for fast, on-line model-checking. Temporal formulae are taken from a temporal logic tailored to the description of intrus...
Julien Olivain, Jean Goubault-Larrecq