This paper presents the ADENOIDS intrusion detection system (IDS). ADENOIDS takes some architectural inspiration from the human immune system and automates intrusion recovery and attack signature extraction. These features are enabled through attack evidence detection. This IDS is initially designed to deal with application attacks, extracting signature for remote buffer overflow attacks. ADENOIDS is described in this paper and experimental results are also presented. These results show that ADENOIDS can discard false-positives and extract signatures which match the attacks. © Springer-Verlag 2004.
CITATION STYLE
De Paula, F. S., & De Geus, P. L. (2004). Attack evidence detection, recovery, and signature extraction with ADENOIDS. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3124, 1083–1092. https://doi.org/10.1007/978-3-540-27824-5_141
Mendeley helps you to discover research relevant for your work.