2011 - MILCOM 2011 Military Communications Conference 2011
DOI: 10.1109/milcom.2011.6127481
|View full text |Cite
|
Sign up to set email alerts
|

Colored Petri nets as the enabling technology in intrusion detection systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…The existing approaches can be classified mainly into two categories: pattern-based and anomaly-based. Pattern-based approaches (using, e.g., on state transition analysis [254] or Petri nets [255]) compare real-time data with available records of data corresponding to attack situations, hence they are effective only in the case of known attacks, because new or slightly modified old attacks would not have related data stored for comparison. On the other hand, anomaly-based detection approaches detect deviations from normal or expected behavior of the system, without any prior knowledge of the attack.…”
Section: Connected Vehicle Systems [220]mentioning
confidence: 99%
“…The existing approaches can be classified mainly into two categories: pattern-based and anomaly-based. Pattern-based approaches (using, e.g., on state transition analysis [254] or Petri nets [255]) compare real-time data with available records of data corresponding to attack situations, hence they are effective only in the case of known attacks, because new or slightly modified old attacks would not have related data stored for comparison. On the other hand, anomaly-based detection approaches detect deviations from normal or expected behavior of the system, without any prior knowledge of the attack.…”
Section: Connected Vehicle Systems [220]mentioning
confidence: 99%
“…Dolgikh et al used CPN as the backbone of the proposed approach to define the functionality of interest as behavior signatures and to serve as the mechanism for the signature detection in IDS [13]. With Petri nets, Voron et al [14] described a formal reference behavior model of the proposed novel approach that automatically generates host-based IDS from program sources.…”
Section: Related Workmentioning
confidence: 99%
“…An overview of intrusion detection Figure 1 Architecture of cyber physical systems system using genetic algorithm and data mining is presented in [22]. Some efforts have been focused on classification and detection of computer intrusions using Colored Petri-nets [23,12,16]. Anomaly detectors pursue the normal behavior of the system.…”
Section: Introductionmentioning
confidence: 99%