Please use this identifier to cite or link to this item: http://scholarbank.nus.edu.sg/handle/10635/39721
Title: Automatic scheme to construct Snort rules from honeypots data
Authors: Li, X.
Liu, D. 
Keywords: Honeypot
Intrusion detection
Signature constructing
Snort
Issue Date: 2005
Source: Li, X.,Liu, D. (2005). Automatic scheme to construct Snort rules from honeypots data. Journal of Systems Engineering and Electronics 16 (2) : 466-470. ScholarBank@NUS Repository.
Abstract: A scheme to construct signatures automatically for Snort from the data captured by honeypots is presented. With this scheme intrusion detection systems can be quickly updated to detect new intrusions soon when happen. The idea is based on the observation that any traffic to and from honeypots represents abnormal activities, so data patterns extracted from these packets can be used by misuse detection system to identify new attacks. The algorithm of constructing rules is discussed. Experiment illustrates the effectiveness of the scheme.
Source Title: Journal of Systems Engineering and Electronics
URI: http://scholarbank.nus.edu.sg/handle/10635/39721
ISSN: 16711793
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.

Page view(s)

60
checked on Dec 8, 2017

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.