Authors
Giovanni Vigna, William Robertson, Davide Balzarotti
Publication date
2004/10/25
Book
Proceedings of the 11th ACM conference on Computer and communications security
Pages
21-30
Description
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect attacks is strongly affected by the quality of their models, which are often called "signatures." A perfect model would be able to detect all the instances of an attack without making mistakes, that is, it would produce a 100% detection rate with 0 false alarms. Unfortunately, writing good models (or good signatures) is hard. Attacks that exploit a specific vulnerability may do so in completely different ways, and writing models that take into account all possible variations is very difficult. For this reason, it would be beneficial to have testing tools that are able to evaluate the "goodness" of detection signatures. This work describes a technique to test and evaluate misuse detection models in the case of network-based intrusion detection systems. The testing …
Total citations
200420052006200720082009201020112012201320142015201620172018201920202021202220231183331172814131411912912101191097
Scholar articles
G Vigna, W Robertson, D Balzarotti - Proceedings of the 11th ACM conference on Computer …, 2004