2005 IEEE Symposium on Security and Privacy (S&P'05)
DOI: 10.1109/sp.2005.10
|View full text |Cite
|
Sign up to set email alerts
|

Language-Based Generation and Evaluation of NIDS Signatures

Abstract: We present a methodology to automatically construct robust signatures whose accuracy is based on formal reasoning so it can be systematically evaluated.Our

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(16 citation statements)
references
References 18 publications
0
16
0
Order By: Relevance
“…al. [34,35] do not distinguish between what the exploit looks like on the network and what it looks like when it is processed on the host, as our Epsilon-Gamma-Pi model does. These works were also intended for generating exploits based on known vulnerabilities and not for analyzing zero-day exploits to derive protection for unknown vulnerabilities.…”
Section: Modeling Polymorphismmentioning
confidence: 95%
See 1 more Smart Citation
“…al. [34,35] do not distinguish between what the exploit looks like on the network and what it looks like when it is processed on the host, as our Epsilon-Gamma-Pi model does. These works were also intended for generating exploits based on known vulnerabilities and not for analyzing zero-day exploits to derive protection for unknown vulnerabilities.…”
Section: Modeling Polymorphismmentioning
confidence: 95%
“…The focus of this paper is on polymorphism and metamorphism of . Other papers have focused on [10,28,34,35,43,44], all of which have already been discussed in this section except for Shield [43]. Shields are a host-based solution which are an alternative to patches.…”
Section: Polymorphic Worm Detectionmentioning
confidence: 99%
“…Such IDSes are the most widely used approach in the commercial IDS technology today. Moreover, abundant research efforts such as [17,30,3,6,24,21] also fall into this category.…”
Section: Limitations Of Existing Approachesmentioning
confidence: 99%
“…If a signature for an attack mutant is supposed to be developed the signature of the basis attack could be reused, if available. Rubin et al further describe in [11] a refinement of signatures based on formal languages. This approach can help the signature developer to remove triggers for false positives caused by imprecise signatures.…”
Section: On the Derivation Of Signaturesmentioning
confidence: 99%