Please use this identifier to cite or link to this item:
http://acervodigital.unesp.br/handle/11449/67059
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cansian, Adriano M. | - |
dc.contributor.author | Da Silva, Artur R.A. | - |
dc.contributor.author | De Souza, Marcelo | - |
dc.date.accessioned | 2014-05-27T11:20:33Z | - |
dc.date.accessioned | 2016-10-25T18:18:09Z | - |
dc.date.available | 2014-05-27T11:20:33Z | - |
dc.date.available | 2016-10-25T18:18:09Z | - |
dc.date.issued | 2002-12-01 | - |
dc.identifier | http://dx.doi.org/10.1109/MILCOM.2002.1179680 | - |
dc.identifier.citation | Proceedings - IEEE Military Communications Conference MILCOM, v. 2, p. 1368-1373. | - |
dc.identifier.uri | http://hdl.handle.net/11449/67059 | - |
dc.identifier.uri | http://acervodigital.unesp.br/handle/11449/67059 | - |
dc.description.abstract | Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process. | en |
dc.format.extent | 1368-1373 | - |
dc.language.iso | eng | - |
dc.source | Scopus | - |
dc.subject | Computer networks | - |
dc.subject | Electronic document identification systems | - |
dc.subject | Information analysis | - |
dc.subject | Security of data | - |
dc.subject | XML | - |
dc.subject | Attack signature model | - |
dc.subject | Intrusion detection system | - |
dc.subject | Intrusion signature format | - |
dc.subject | Military communications | - |
dc.title | An attack signature model to computer security intrusion detection | en |
dc.type | outro | - |
dc.contributor.institution | Universidade Estadual Paulista (UNESP) | - |
dc.description.affiliation | ACME Comp. Security Research Lab. UNESP - Sao Paulo State University, Sao Jose do Rio Preto, SP | - |
dc.description.affiliationUnesp | ACME Comp. Security Research Lab. UNESP - Sao Paulo State University, Sao Jose do Rio Preto, SP | - |
dc.identifier.doi | 10.1109/MILCOM.2002.1179680 | - |
dc.identifier.wos | WOS:000180880500250 | - |
dc.rights.accessRights | Acesso restrito | - |
dc.relation.ispartof | Proceedings - IEEE Military Communications Conference MILCOM | - |
dc.identifier.scopus | 2-s2.0-0037004539 | - |
Appears in Collections: | Artigos, TCCs, Teses e Dissertações da Unesp |
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.