Abstract:
Network based intrusion detection are the most deployed IDS. They frequently rely on signature matching detection method and focus on the security of low level network pr...Show MoreMetadata
Abstract:
Network based intrusion detection are the most deployed IDS. They frequently rely on signature matching detection method and focus on the security of low level network protocols. Because of the large number of false positives from one side, and the incapacity to detect some attack types from another side, IDS must allow more interest to the monitoring of application level protocols. We propose in this paper a combination of pattern matching and protocol analysis approaches. While the first method of detection relies on a multipattern matching strategy, the second one benefits from an efficient decision tree adaptive to the network traffic characteristics.
Published in: International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.
Date of Conference: 05-07 April 2004
Date Added to IEEE Xplore: 24 August 2004
Print ISBN:0-7695-2108-8