Attack evidence detection, recovery, and signature extraction with ADENOIDS

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents the ADENOIDS intrusion detection system (IDS). ADENOIDS takes some architectural inspiration from the human immune system and automates intrusion recovery and attack signature extraction. These features are enabled through attack evidence detection. This IDS is initially designed to deal with application attacks, extracting signature for remote buffer overflow attacks. ADENOIDS is described in this paper and experimental results are also presented. These results show that ADENOIDS can discard false-positives and extract signatures which match the attacks. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

De Paula, F. S., & De Geus, P. L. (2004). Attack evidence detection, recovery, and signature extraction with ADENOIDS. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3124, 1083–1092. https://doi.org/10.1007/978-3-540-27824-5_141

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free