A. Cansian, Anderson Aparecido Alves da Silva, M. D. de Souza
{"title":"计算机安全入侵检测中的攻击签名模型","authors":"A. Cansian, Anderson Aparecido Alves da Silva, M. D. de Souza","doi":"10.1109/MILCOM.2002.1179680","DOIUrl":null,"url":null,"abstract":"Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing us to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signature handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.","PeriodicalId":191931,"journal":{"name":"MILCOM 2002. Proceedings","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"An attack signature model to computer security intrusion detection\",\"authors\":\"A. Cansian, Anderson Aparecido Alves da Silva, M. D. de Souza\",\"doi\":\"10.1109/MILCOM.2002.1179680\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing us to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signature handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.\",\"PeriodicalId\":191931,\"journal\":{\"name\":\"MILCOM 2002. Proceedings\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 2002. Proceedings\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.2002.1179680\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2002. Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2002.1179680","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An attack signature model to computer security intrusion detection
Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing us to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signature handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.