Low Level Network Attack Recognition A Signature Based Approach
نویسندگان
چکیده
This research presents a new method for detecting network attacks based on network tra c signatures The method emphasizes low level analysis of network tra c high e ciency real time operation and accurate identi cation of attacks Attack recogni tion is based on the analysis of TCP protocol ags with respect to speci c attacks and is characterized by its simplicity Index Terms Attack recognition intrusion detection attack signatures
منابع مشابه
Attack Recognition for System Survivability: A Low-level Approach
This paper extends and builds on previous work that presented a signature-based attack recognition technique. We present general requirements for “survivable attack recognition” and discuss how our approach fits the requirements. Empirical results are given along with an estimate of the measured performance. Other work is reviewed within the context of attack recognition for survivability.
متن کاملAlert correlation and prediction using data mining and HMM
Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...
متن کاملتولید خودکار الگوهای نفوذ جدید با استفاده از طبقهبندهای تک کلاسی و روشهای یادگیری استقرایی
In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملStatic Signature Verification and Recognition using Neural Network Approach-A Survey
A number of biometric techniques have been used for personal identification such as face recognition, fingerprint recognition, voice recognition and signature recognition. However signature verification is most widely used. Signature being the most prominent handwritten proof of identity is used for authentication of documents in the fields of financial, commercial and legal transactions which ...
متن کامل