Sciweavers

3 search results - page 1 / 1
» From Declarative Signatures to Misuse IDS
Sort
View
RAID
2001
Springer
14 years 3 months ago
From Declarative Signatures to Misuse IDS
Jean-Philippe Pouzol, Mireille Ducassé
ACSAC
2008
IEEE
14 years 5 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
JSW
2008
164views more  JSW 2008»
13 years 11 months ago
Constraint-based Trend Template for Intrusion Detection
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...