Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis (original) (raw)

Enhancing Byte-Level Network Intrusion Detection Signatures with Context

Alicia Frazier

View PDFchevron_right

IJERT-Signature-Based Network Intrusion Detection System Using SNORT And WINPCAP

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2012

View PDFchevron_right

Attacks Detection Based on IP and TCP Protocols Violation

Norma Gomes

The International Journal of Forensic Computer Science, 2006

View PDFchevron_right

Evasive Attack on Stateful Signature-based Network Intrusion Detection Systems

Ehab Al-Shaer

View PDFchevron_right

Snort: Lightweight Intrusion Detection for Networks

Arnab Pal

1999

View PDFchevron_right

EVALUATION OF FUTURE PERSPECTIVES ON SNORT AND WIRESHARK AS TOOLS AND TECHNIQUES FOR INTRUSION DETECTION SYSTEM

SUDHANSHU SEKHAR TRIPATHY

Industrial Engineering Journal, 2024

View PDFchevron_right

ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems

Bruno Crispo

2008

View PDFchevron_right

An analysis of Network Intrusion Detection System using SNORT

IJSRD - International Journal for Scientific Research and Development

IJSRD, 2013

View PDFchevron_right

Snort Rule Detection for Countering in Network Attacks

S. Venkateswarlu, Bala Kamesh, Sastry Kodanda Rama Jammalamadaka

View PDFchevron_right

SNORT—LIGHTWEIGHT INTRUSION DETECTION FOR NETWORKSSnort – Lightweight Intrusion Detection for Networks

Deepak Singh

View PDFchevron_right

DESIGN & IMPLEMENTATION OF LAYERED SIGNATURE BASED INTRUSION DETECTION SYSTEM USING SNORT

Noor Farjana

View PDFchevron_right

On the fly pattern matching for intrusion detection with Snort

Tarek Abbes

Annales des Télécommunications, 2004

View PDFchevron_right

Automated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes)

Trisha Castillo

View PDFchevron_right

Signature Based Intrusion Detection System Using SNORT

zizi aja

View PDFchevron_right

Systematic Signature Engineering by Re-use of Snort Signatures

Sebastian Schmerl

2008 Annual Computer Security Applications Conference (ACSAC), 2008

View PDFchevron_right

A Novel Signature-Based Traffic Classification Engine To Reduce False Alarms In Intrusion Detection Systems

Md. Azizul Islam

International journal of Computer Networks & Communications, 2015

View PDFchevron_right

Detecting network intrusions via a statistical analysis of network packet characteristics

Shawn Ostermann

2002

View PDFchevron_right

Signature-based Intrusion Detection

Boriana Ditcheva

2000

View PDFchevron_right

Network Protocol Analysis for Anomaly Detection

K.Sri Sakthi Vignesh, R.L.N dinesh, RATNASELVAN S 2021-CSEUG BATCH

Unveiling Hidden Threats: Anomaly Detection via Network Protocol Analysis, 2023

View PDFchevron_right

Efficient decision tree for protocol analysis in intrusion detection

Tarek Abbes

International Journal of Security and Networks, 2010

View PDFchevron_right

Improving NIDS Rules for Protocols with Detection of Abnormal Traffic in Real Time Traffic Using Snort

International Journal of Scientific Research in Science, Engineering and Technology IJSRSET

View PDFchevron_right

Techniques for Reduction of False Alarms in Signature-Based Intrusion Detection Systems

Talha Naqash

View PDFchevron_right

Intrusion Detection System Using SNORT

Swasti singhal

View PDFchevron_right

A Threat-Aware Signature Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms

Subramanian Neelakantan, Shrisha Rao

… and Protection, 2008. ICIMP'08. The …, 2008

View PDFchevron_right

On understanding normal protocol behaviour to monitor and mitigate the abnormal

Helmut Leopold

2006

View PDFchevron_right

Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics

THE DAT Phung

View PDFchevron_right

Using CLIPS to Detect Network Intrusions

Pedro Alípio

2003

View PDFchevron_right

An environment for security protocol intrusion detection

Alec Yasinsac

Journal of Computer Security, 2002

View PDFchevron_right

Automated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities

Trisha Mari Del Castillo

View PDFchevron_right

PISA: automatic extraction of traffic signatures

Ajita John

2005

View PDFchevron_right

A PROPOSED INTRUSION ALERTS VERIFICATION AND CORRELATION MECHANISM

Ikuomola Aderonke

View PDFchevron_right