首页> 外文会议>2011 International conference on multimedia computing and systems >Generation of attack scenarios by modeling algorithms for evaluating IDS
【24h】

Generation of attack scenarios by modeling algorithms for evaluating IDS

机译:通过对用于评估IDS的算法建模来生成攻击场景

获取原文

摘要

We will focus in this paper to improve the level of intrusion detection system (IDS). This improvement is based on three research areas: classification of attacks, generation of attack scenarios and finally evaluation methods. We will discuss in this article the second area, which consists on the research of meaningful scenarios in order to minimize false and positive alerts reported by an IDS. We will present two algorithms generating these scenarios. The first one allows the conversion of the problem to a constraint programming problem (CSP) and the second one is based on an algorithm to search the shortest path. We will also compare the results of these two algorithms.
机译:我们将在本文中着重提高入侵检测系统(IDS)的水平。此改进基于三个研究领域:攻击分类,攻击场景的生成以及最终评估方法。我们将在本文中讨论第二个领域,该领域包括对有意义的方案的研究,以最大程度地减少IDS报告的错误和正面警报。我们将介绍两种生成这些方案的算法。第一个允许将问题转换为约束编程问题(CSP),第二个基于搜索最短路径的算法。我们还将比较这两种算法的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号