Please use this identifier to cite or link to this item:
|Title:||Automatic scheme to construct Snort rules from honeypots data||Authors:||Li, X.
|Issue Date:||2005||Citation:||Li, X.,Liu, D. (2005). Automatic scheme to construct Snort rules from honeypots data. Journal of Systems Engineering and Electronics 16 (2) : 466-470. ScholarBank@NUS Repository.||Abstract:||A scheme to construct signatures automatically for Snort from the data captured by honeypots is presented. With this scheme intrusion detection systems can be quickly updated to detect new intrusions soon when happen. The idea is based on the observation that any traffic to and from honeypots represents abnormal activities, so data patterns extracted from these packets can be used by misuse detection system to identify new attacks. The algorithm of constructing rules is discussed. Experiment illustrates the effectiveness of the scheme.||Source Title:||Journal of Systems Engineering and Electronics||URI:||http://scholarbank.nus.edu.sg/handle/10635/39721||ISSN:||16711793|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on Apr 19, 2019
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.