Please use this identifier to cite or link to this item:
Title: Automatic scheme to construct Snort rules from honeypots data
Authors: Li, X.
Liu, D. 
Keywords: Honeypot
Intrusion detection
Signature constructing
Issue Date: 2005
Citation: Li, X.,Liu, D. (2005). Automatic scheme to construct Snort rules from honeypots data. Journal of Systems Engineering and Electronics 16 (2) : 466-470. ScholarBank@NUS Repository.
Abstract: A scheme to construct signatures automatically for Snort from the data captured by honeypots is presented. With this scheme intrusion detection systems can be quickly updated to detect new intrusions soon when happen. The idea is based on the observation that any traffic to and from honeypots represents abnormal activities, so data patterns extracted from these packets can be used by misuse detection system to identify new attacks. The algorithm of constructing rules is discussed. Experiment illustrates the effectiveness of the scheme.
Source Title: Journal of Systems Engineering and Electronics
ISSN: 16711793
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.