2015 6th International Conference on the Network of the Future (NOF) 2015
DOI: 10.1109/nof.2015.7333305
|View full text |Cite
|
Sign up to set email alerts
|

Toward a novel classification-based attack detection and response architecture

Abstract: International audienceAttacks on information systems have increased tremendously and have become more diverse and complex. Evolving in an unpredictable manner and having devastating outcomes, the detection and the selection of appropriate countermeasures has become a priority for security analysts. This paper introduces a classification-based Attack Detection system which provides a framework to evaluate, identify, classify and defend against sophisticated attacks. Our approach helps simplify complex rules' ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Their approach contributes in simplifying complicated rule expressions and alert management using a modular design and instinctive rules defined with with a strong expression language. It has the ability to learn from previous attack detecttions and it is not focused on the attack itself instead it is concentrated on attack category; this property helps to sum up defense mechanisms and automates response [19].…”
Section: Related Workmentioning
confidence: 99%
“…Their approach contributes in simplifying complicated rule expressions and alert management using a modular design and instinctive rules defined with with a strong expression language. It has the ability to learn from previous attack detecttions and it is not focused on the attack itself instead it is concentrated on attack category; this property helps to sum up defense mechanisms and automates response [19].…”
Section: Related Workmentioning
confidence: 99%
“…This language is used in our AIDD (Attack Identification, Description and Defense) architecture defined in [14]. This language may have several applications.…”
Section: Potential Applicationsmentioning
confidence: 99%
“…We take into consideration 2 types of attacks: a simple one with SQL injection and complex attack scenario. We use in these cases the AIDD system we defined in [14] for attack detection. This system uses our Composed Language to define rules.…”
Section: Use Casementioning
confidence: 99%