2008
DOI: 10.1002/sec.77
|View full text |Cite
|
Sign up to set email alerts
|

Syntax, and semantics‐based signature database for hybrid intrusion detection systems

Abstract: Signature-based intrusion detection systems (IDSs) have the advantages of producing a lower false alarm rate and using less system resources compared to anomaly based systems. However, they are susceptible to obfuscation used by attackers to introduce new variants of the attacks stored in the database. Some of the disadvantages of signaturebased IDSs can be attributed to the fact that they are mostly purely syntactic and ignore the semantics of the monitored systems. In this paper, we present the design and im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…However, the current generation of IDS systems in SCADA networks are often faced with several challenges. First, the majority of the existing systems, especially signaturebased, are purely syntactic and lack a clear description of intrusion behaviours and semantics of the monitored systems (Barry and Chan, 2009). This issue may result in missing the detection of sophisticated attacks (Hadžiosmanović et al, 2014) such as Stuxnet (Langner, 2011) that may exploit legitimate looking commands to cause damage on the system.…”
Section: Introductionmentioning
confidence: 99%
“…However, the current generation of IDS systems in SCADA networks are often faced with several challenges. First, the majority of the existing systems, especially signaturebased, are purely syntactic and lack a clear description of intrusion behaviours and semantics of the monitored systems (Barry and Chan, 2009). This issue may result in missing the detection of sophisticated attacks (Hadžiosmanović et al, 2014) such as Stuxnet (Langner, 2011) that may exploit legitimate looking commands to cause damage on the system.…”
Section: Introductionmentioning
confidence: 99%
“…Intrusion detection systems have been widely used to protect multitier web services, such as to detect known attacks by matching misused traffic patterns or signatures [7][8][9][10]. Individually, the web IDS and the database IDS can detect abnormal network traffic sent to either of them.…”
Section: Introductionmentioning
confidence: 99%
“…To protect multi-tiered web services, Intrusion detection systems (IDS) have been widely used to detect known attacks by matching misused traffic patterns or signatures [34], [30], [33], [22]. A class of IDS that leverages machine learning can also detect unknown attacks by identifying abnormal network traffic that deviates from the so-called "normal" behavior previously profiled during the IDS training phase.…”
mentioning
confidence: 99%