2001
DOI: 10.1007/3-540-45474-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Experiences with Specification-Based Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
78
0
3

Year Published

2002
2002
2016
2016

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 96 publications
(82 citation statements)
references
References 2 publications
1
78
0
3
Order By: Relevance
“…So while our datasets did not include actual attacks, we were able to reliably detect notable deviations from the specifications at zero false-positives. This result is in line with the work of Uppuluri et al [179] showing that specification-based intrusion detection works towards optimal detection rate while substantially decreasing the number of false positives compared to anomaly-based detection.…”
Section: Discussionsupporting
confidence: 91%
“…So while our datasets did not include actual attacks, we were able to reliably detect notable deviations from the specifications at zero false-positives. This result is in line with the work of Uppuluri et al [179] showing that specification-based intrusion detection works towards optimal detection rate while substantially decreasing the number of false positives compared to anomaly-based detection.…”
Section: Discussionsupporting
confidence: 91%
“…And for keeping them up to date is a demanding task. [2] 3) Specification-Based Intrusion Detection Proposals: The SBID approach was introduced and tested in fixed networks in [21] [22] [23]. In MANETs, SBIDs describe the correct operation of the protocol by defining a set of constraints, and monitor the execution of the protocol with respect to the defined constraints to detect anomalies in the network.…”
Section: ) Anomaly-based Intrusion Detectionmentioning
confidence: 99%
“…Therefore, these techniques are generally employed together for effective intrusion detection. Specification-based technique is introduced as a promising alternative that combines the strengths of anomaly-based and misuse-based detection techniques [28], providing detection of known and unknown attacks with lower false positive rate. In this technique, a set of constraints of a program or a protocol are specified and intrusions are detected as runtime violations of these specifications.…”
Section: Introductionmentioning
confidence: 99%