An attack signature model to computer security intrusion detection

5Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.

Cite

CITATION STYLE

APA

Cansian, A. M., Da Silva, A. R. A., & De Souza, M. (2002). An attack signature model to computer security intrusion detection. In Proceedings - IEEE Military Communications Conference MILCOM (Vol. 2, pp. 1368–1373). https://doi.org/10.1109/milcom.2002.1179680

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free