P. García-Teodoro, Pablo Muñoz-Feldstedt, David Ruete-Zúñiga
{"title":"通过选择性抽取异常内容自动生成网络服务签名","authors":"P. García-Teodoro, Pablo Muñoz-Feldstedt, David Ruete-Zúñiga","doi":"10.1109/AICT.2010.22","DOIUrl":null,"url":null,"abstract":"In this paper, a novel methodology for automatic signature generation is proposed. It is based on modelling the normal behaviour of a given network service, and identifying the contents that contribute the most to the anomalous classification of a given event. These contents are extracted to provide the anomaly with a “signature” for representing it. The promising experimental results obtained show that the proposed scheme can actively contribute to the usual hard task of creating signatures for new attacks, thus improving the general monitoring and security management of network environments.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Automatic Signature Generation for Network Services through Selective Extraction of Anomalous Contents\",\"authors\":\"P. García-Teodoro, Pablo Muñoz-Feldstedt, David Ruete-Zúñiga\",\"doi\":\"10.1109/AICT.2010.22\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, a novel methodology for automatic signature generation is proposed. It is based on modelling the normal behaviour of a given network service, and identifying the contents that contribute the most to the anomalous classification of a given event. These contents are extracted to provide the anomaly with a “signature” for representing it. The promising experimental results obtained show that the proposed scheme can actively contribute to the usual hard task of creating signatures for new attacks, thus improving the general monitoring and security management of network environments.\",\"PeriodicalId\":339151,\"journal\":{\"name\":\"2010 Sixth Advanced International Conference on Telecommunications\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Sixth Advanced International Conference on Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AICT.2010.22\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Sixth Advanced International Conference on Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AICT.2010.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automatic Signature Generation for Network Services through Selective Extraction of Anomalous Contents
In this paper, a novel methodology for automatic signature generation is proposed. It is based on modelling the normal behaviour of a given network service, and identifying the contents that contribute the most to the anomalous classification of a given event. These contents are extracted to provide the anomaly with a “signature” for representing it. The promising experimental results obtained show that the proposed scheme can actively contribute to the usual hard task of creating signatures for new attacks, thus improving the general monitoring and security management of network environments.