P. García-Teodoro, Pablo Muñoz-Feldstedt, David Ruete-Zúñiga
{"title":"Automatic Signature Generation for Network Services through Selective Extraction of Anomalous Contents","authors":"P. García-Teodoro, Pablo Muñoz-Feldstedt, David Ruete-Zúñiga","doi":"10.1109/AICT.2010.22","DOIUrl":null,"url":null,"abstract":"In this paper, a novel methodology for automatic signature generation is proposed. It is based on modelling the normal behaviour of a given network service, and identifying the contents that contribute the most to the anomalous classification of a given event. These contents are extracted to provide the anomaly with a “signature” for representing it. The promising experimental results obtained show that the proposed scheme can actively contribute to the usual hard task of creating signatures for new attacks, thus improving the general monitoring and security management of network environments.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Sixth Advanced International Conference on Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AICT.2010.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
In this paper, a novel methodology for automatic signature generation is proposed. It is based on modelling the normal behaviour of a given network service, and identifying the contents that contribute the most to the anomalous classification of a given event. These contents are extracted to provide the anomaly with a “signature” for representing it. The promising experimental results obtained show that the proposed scheme can actively contribute to the usual hard task of creating signatures for new attacks, thus improving the general monitoring and security management of network environments.