2002
DOI: 10.3233/jcs-2002-101-204
|View full text |Cite
|
Sign up to set email alerts
|

STATL: An attack language for state-based intrusion detection

Abstract: STATL is an extensible state/transition-based attack description language designed to support intrusion detection. The language allows one to describe computer penetrations as sequences of actions that an attacker performs to compromise a computer system. A STATL description of an attack scenario can be used by an intrusion detection system to analyze a stream of events and detect possible ongoing intrusions. Since intrusion detection is performed in different domains (i.e., the network or the hosts) and in di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
145
0
5

Year Published

2006
2006
2017
2017

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 239 publications
(151 citation statements)
references
References 15 publications
0
145
0
5
Order By: Relevance
“…This is remarkable due the fact that most signature languages have an underlying strict semantic model (e.g. STATL [5], Bro [6], EDL [2]). The approach demonstrated here uses the signature description language EDL (Event Description Language) as example of a signature modeling language.…”
Section: On the Modeling Of Complex Signaturesmentioning
confidence: 99%
See 1 more Smart Citation
“…This is remarkable due the fact that most signature languages have an underlying strict semantic model (e.g. STATL [5], Bro [6], EDL [2]). The approach demonstrated here uses the signature description language EDL (Event Description Language) as example of a signature modeling language.…”
Section: On the Modeling Of Complex Signaturesmentioning
confidence: 99%
“…as finite state machines. Examples of such signature description languages are STATL [5], [3], Bro [6], IDIOT [7], and EDL [2], which define a strict semantic for the signatures. These languages though are mostly related to a concrete intrusion detection system.…”
Section: Motivationmentioning
confidence: 99%
“…Misuse detection models the patterns of known attacks or vulnerabilities, and identifies actions that conform to such patterns as attacks. Existing approaches include rule-based methods (e.g., ASAX [26], P-BEST [25]), state transition based methods [5], [14], and data mining approaches [22], [23]. Most of these techniques cannot be directly applied to sensor networks due to the resource constraints on sensor nodes.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…A technique for alert correlation based on state-transition graphs is shown in [3]. The use of finite state automata enables for complex scenario descriptions, but it requires known scenarios signatures.…”
Section: Problem Statement and State Of The Artmentioning
confidence: 99%