Emerging Trends in Information and Communication Security

  • Schmerl S
  • Koenig H
  • Flegel U
  • et al.
ISSN: 03029743
N/ACitations
Citations of this article
37Readers
Mendeley users who have this article in their library.

Abstract

Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns, i.e. signatures. A signature is usually empirically developed based on experience and expert knowledge. Methods for a systematic development are scarcely reported yet. Automated approaches to reusing design and modeling decisions of available signatures also do not exist. This induces relatively long development times for signatures causing inappropriate vulnerability windows. In this paper we present an approach for systematic signature derivation. It is based on the reuse of existing signatures to exploit similarities with existing attacks for deriving a new signature. The approach is based on an iterative abstraction of signatures. Based on a weighted abstraction tree it selects those signatures or signature fragments, which are similar to the novel attack. Finally, we present a practical application of the approach using the signature description language EDL. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Schmerl, S., Koenig, H., Flegel, U., & Meier, M. (2006). Emerging Trends in Information and Communication Security. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3995, pp. 436–450). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-33746604759&partnerID=tZOtx3y1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free