Results 1 - 10
of
2,394
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment
"... This paper presents a new algorithm for generation of attack signatures based on sequence alignment. The algorithm is composed of two parts: a local alignment algorithm-GASBSLA (Generation of Attack Signatures Based on Sequence Local Alignment) and a multi-sequence alignment algorithm-TGMSA (Tri-sta ..."
Abstract
- Add to MetaCart
This paper presents a new algorithm for generation of attack signatures based on sequence alignment. The algorithm is composed of two parts: a local alignment algorithm-GASBSLA (Generation of Attack Signatures Based on Sequence Local Alignment) and a multi-sequence alignment algorithm-TGMSA (Tri
Execution Trace-Driven Automated Attack Signature Generation
"... In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application. Filter rules used in firewall and network intrusion prevention systems (NIPS) are an abstract form of attack signature. ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application. Filter rules used in firewall and network intrusion prevention systems (NIPS) are an abstract form of attack signature
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
, 1995
"... We present a digital signature scheme based on the computational diculty of integer factorization. The scheme possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice (where each message may be chosen in a ..."
Abstract
-
Cited by 959 (40 self)
- Add to MetaCart
We present a digital signature scheme based on the computational diculty of integer factorization. The scheme possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice (where each message may be chosen
A model for the semantics of attack signatures in misuse detection systems
- In: Proc. ISC
, 2004
"... mm{-at-}informatik.tu-cottbus.de Abstract. Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of attack signatures. A couple of languages are proposed in the literature, which ..."
Abstract
-
Cited by 9 (2 self)
- Add to MetaCart
mm{-at-}informatik.tu-cottbus.de Abstract. Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of attack signatures. A couple of languages are proposed in the literature
Optimizing the Observation Windows Size for Kernel Attack Signatures
"... In this paper we introduce a signature-based intrusion detection methodology which utilizes lowlevel kernel data in order to identify network attacks in real time. Different types of attacks have different behavior characteristics over time, and thus require observation intervals of different length ..."
Abstract
- Add to MetaCart
In this paper we introduce a signature-based intrusion detection methodology which utilizes lowlevel kernel data in order to identify network attacks in real time. Different types of attacks have different behavior characteristics over time, and thus require observation intervals of different
How To Prove Yourself: Practical Solutions to Identification and Signature Problems
, 1987
"... In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring is difficult ..."
Abstract
-
Cited by 1028 (1 self)
- Add to MetaCart
In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring
Survivability of computers and networks based on attack signatures
- In Proceedings of the 3rd Information Survivability Workshop, (ISW-2000
"... Research dealing with malicious acts can be partitioned into three areas, namely Resistance, Recognition and Recovery [1]. Resistance encompasses traditional mechanisms that make it difficult for a hacker to infiltrate a system. Recognition on the other hand deals with intrusion detection. Resistanc ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
. Resistance failed and intrusion detection methods attempt to observe the malicious act by detecting unusual system behavior. Traditionally, this is done with the help of log files, e.g. the log files are scanned to match known sequences of previous attacks. Lastly, recovery addresses the issue of surviving
SHEDEL - A Simple Hierarchical Event Description Language for Specifying Attack Signatures
- Proceedings of the IFIP International Conference on Information Security
, 2002
"... Abstract: A main problem for the detection of security violations in misuse detection systems is the manner how attack scenarios (signatures) are described. Attack languages are used to specify attack scenarios for misuse detection systems. Usually not only the attack signatures are described also s ..."
Abstract
-
Cited by 7 (3 self)
- Add to MetaCart
Abstract: A main problem for the detection of security violations in misuse detection systems is the manner how attack scenarios (signatures) are described. Attack languages are used to specify attack scenarios for misuse detection systems. Usually not only the attack signatures are described also
Rashid Waraich Automated Attack Signature Generation: A Survey
, 2005
"... Hardening IT infrastructures of today’s web-centric society against any form of attacks is a critical factor for the success of internet services. The arising expenses in case of violations of confidentiality, integrity or availability (CIA) of provided data and services are hard to estimate, but us ..."
Abstract
- Add to MetaCart
, but usually substantial. In recent years lots of research about how to increase the security of IT infrastructures has been done. The emerging NoAH project focuses thereby on the field of automated attack signature generation. This survey is part of the NoAH project and helps in getting an overview about
Modeling Temporal Properties of Multi-event Attack Signatures in Interval Temporal Logic
"... Abstract — In this paper we address the problem of modeling different temporal relationships between events in multi-event attack signatures. In many existing signature representations encoding and interpreting such temporal properties can be difficult tasks. There is a growing need for a formalism ..."
Abstract
- Add to MetaCart
Abstract — In this paper we address the problem of modeling different temporal relationships between events in multi-event attack signatures. In many existing signature representations encoding and interpreting such temporal properties can be difficult tasks. There is a growing need for a formalism
Results 1 - 10
of
2,394