Automated testing of IDS rules

作者: Zeeshan Afzal , Stefan Lindskog

DOI: 10.1109/ICSTW.2015.7107461

关键词:

摘要: As technology becomes ubiquitous, new vulnerabilities are being discovered at a rapid rate. Security experts continuously find ways to detect attempts exploit those vulnerabilities. The outcome is an extremely large and complex rule set used by Intrusion Detection Systems (IDSs) prevent the sets have become so that it seems infeasible verify their precision or identify overlapping rules. This work proposes methodology consisting of tools will make management easier.

参考文章(3)
Samuel Patton, An Achilles Heel in Signature-Based IDS : Squealing False Positives in SNORT Proceedings of RAID2001, Davis, CA, USA. ,(2001)
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
D. Mutz, G. Vigna, R. Kemmerer, An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems annual computer security applications conference. pp. 374- 383 ,(2003) , 10.1109/CSAC.2003.1254342