Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns, i.e. signatures. A signature is usually empirically developed based on experience and expert knowledge. Methods for a systematic development are scarcely reported yet. Automated approaches to reusing design and modeling decisions of available signatures also do not exist. This induces relatively long development times for signatures causing inappropriate vulnerability windows. In this paper we present an approach for systematic signature derivation. It is based on the reuse of existing signatures to exploit similarities with existing attacks for deriving a new signature. The approach is based on an iterative abstraction of signatures. Based on a weighted abstraction tree it selects those signatures or signature fragments, which are similar to the novel attack. Finally, we present a practical application of the approach using the signature description language EDL. © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Schmerl, S., Koenig, H., Flegel, U., & Meier, M. (2006). Emerging Trends in Information and Communication Security. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3995, pp. 436–450). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-33746604759&partnerID=tZOtx3y1
Mendeley helps you to discover research relevant for your work.