IDS rule management made easy

作者: Zeeshan Afzal , Stefan Lindskog

DOI: 10.1109/ECAI.2016.7861119

关键词:

摘要: … to make the selection of the IDS solution easier and unbiased. … (1) a statistical analysis of the evolution of IDS rules from the … utilize the IDS rulesets of Snort, which consist of rules written …

参考文章(11)
Bruno Dutertre, Steven Cheung, Martin Fong, Alfonso Valdes, Ulf Lindqvist, Keith Skinner, Using Model-based Intrusion Detection for SCADA Networks ,(2006)
Samuel Patton, An Achilles Heel in Signature-Based IDS : Squealing False Positives in SNORT Proceedings of RAID2001, Davis, CA, USA. ,(2001)
Zeeshan Afzal, Stefan Lindskog, Automated testing of IDS rules international conference on software testing verification and validation workshops. pp. 1- 2 ,(2015) , 10.1109/ICSTW.2015.7107461
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
A. Ford, C. Raiciu, M. Handley, O. Bonaventure, C. Paasch, TCP Extensions for Multipath Operation with Multiple Addresses Internet Engineering Task Force (IEFT). ,vol. 6824, pp. 1- 65 ,(2020) , 10.17487/RFC8684
Zeeshan Afzal, Stefan Lindskog, Multipath TCP IDS Evasion and Mitigation international conference on information security. ,vol. 9290, pp. 265- 282 ,(2015) , 10.1007/978-3-319-23318-5_15
Linda Briesemeister, Steven Cheung, Ulf Lindqvist, Alfonso Valdes, Detection, correlation, and visualization of attacks against critical infrastructure systems conference on privacy, security and trust. pp. 15- 22 ,(2010) , 10.1109/PST.2010.5593242
Frederic Massicotte, Francois Gagnon, Yvan Labiche, Lionel Briand, Mathieu Couture, Automatic Evaluation of Intrusion Detection Systems annual computer security applications conference. pp. 361- 370 ,(2006) , 10.1109/ACSAC.2006.15
Jeff Ahrenholz, Claudiu Danilov, Thomas R. Henderson, Jae H. Kim, CORE: A real-time network emulator military communications conference. pp. 1- 7 ,(2008) , 10.1109/MILCOM.2008.4753614