2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 2017
DOI: 10.1109/dasc-picom-datacom-cyberscitec.2017.106
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Attack Signature Generation Framework for Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Shahriar and Bond proposed a method for automatically generating signatures [4]. The genetic algorithm generates them based on other signatures.…”
Section: A Idpsmentioning
confidence: 99%
See 2 more Smart Citations
“…Shahriar and Bond proposed a method for automatically generating signatures [4]. The genetic algorithm generates them based on other signatures.…”
Section: A Idpsmentioning
confidence: 99%
“…and their IDs or URLs, which allow information related to the signature to be uniquely identified. For example, when referring to CVEs, information can be obtained by searching for an ID in web systems such as the National Vulnerability Database (NVD) 4 and RedHat's CVE Database 5 . Examples of signature-related information include the software targeted by the malicious communication indicated by the signature and its version information.…”
Section: Web Information and Message Featuresmentioning
confidence: 99%
See 1 more Smart Citation