Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/39721
DC Field | Value | |
---|---|---|
dc.title | Automatic scheme to construct Snort rules from honeypots data | |
dc.contributor.author | Li, X. | |
dc.contributor.author | Liu, D. | |
dc.date.accessioned | 2013-07-04T07:48:03Z | |
dc.date.available | 2013-07-04T07:48:03Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Li, X.,Liu, D. (2005). Automatic scheme to construct Snort rules from honeypots data. Journal of Systems Engineering and Electronics 16 (2) : 466-470. ScholarBank@NUS Repository. | |
dc.identifier.issn | 16711793 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/39721 | |
dc.description.abstract | A scheme to construct signatures automatically for Snort from the data captured by honeypots is presented. With this scheme intrusion detection systems can be quickly updated to detect new intrusions soon when happen. The idea is based on the observation that any traffic to and from honeypots represents abnormal activities, so data patterns extracted from these packets can be used by misuse detection system to identify new attacks. The algorithm of constructing rules is discussed. Experiment illustrates the effectiveness of the scheme. | |
dc.source | Scopus | |
dc.subject | Honeypot | |
dc.subject | Intrusion detection | |
dc.subject | Signature constructing | |
dc.subject | Snort | |
dc.type | Article | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.sourcetitle | Journal of Systems Engineering and Electronics | |
dc.description.volume | 16 | |
dc.description.issue | 2 | |
dc.description.page | 466-470 | |
dc.description.coden | JSEEF | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.