作者: Zeeshan Afzal , Stefan Lindskog
DOI: 10.1109/ICSTW.2015.7107461
关键词:
摘要: As technology becomes ubiquitous, new vulnerabilities are being discovered at a rapid rate. Security experts continuously find ways to detect attempts exploit those vulnerabilities. The outcome is an extremely large and complex rule set used by Intrusion Detection Systems (IDSs) prevent the sets have become so that it seems infeasible verify their precision or identify overlapping rules. This work proposes methodology consisting of tools will make management easier.