Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis (original) (raw)
Related papers
Enhancing Byte-Level Network Intrusion Detection Signatures with Context
IJERT-Signature-Based Network Intrusion Detection System Using SNORT And WINPCAP
International Journal of Engineering Research and Technology (IJERT), 2012
Attacks Detection Based on IP and TCP Protocols Violation
The International Journal of Forensic Computer Science, 2006
Evasive Attack on Stateful Signature-based Network Intrusion Detection Systems
Snort: Lightweight Intrusion Detection for Networks
1999
Industrial Engineering Journal, 2024
ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems
2008
An analysis of Network Intrusion Detection System using SNORT
IJSRD - International Journal for Scientific Research and Development
IJSRD, 2013
Snort Rule Detection for Countering in Network Attacks
S. Venkateswarlu, Bala Kamesh, Sastry Kodanda Rama Jammalamadaka
DESIGN & IMPLEMENTATION OF LAYERED SIGNATURE BASED INTRUSION DETECTION SYSTEM USING SNORT
On the fly pattern matching for intrusion detection with Snort
Annales des Télécommunications, 2004
Signature Based Intrusion Detection System Using SNORT
Systematic Signature Engineering by Re-use of Snort Signatures
2008 Annual Computer Security Applications Conference (ACSAC), 2008
International journal of Computer Networks & Communications, 2015
Detecting network intrusions via a statistical analysis of network packet characteristics
2002
Signature-based Intrusion Detection
2000
Network Protocol Analysis for Anomaly Detection
K.Sri Sakthi Vignesh, R.L.N dinesh, RATNASELVAN S 2021-CSEUG BATCH
Unveiling Hidden Threats: Anomaly Detection via Network Protocol Analysis, 2023
Efficient decision tree for protocol analysis in intrusion detection
International Journal of Security and Networks, 2010
International Journal of Scientific Research in Science, Engineering and Technology IJSRSET
Techniques for Reduction of False Alarms in Signature-Based Intrusion Detection Systems
Intrusion Detection System Using SNORT
Subramanian Neelakantan, Shrisha Rao
… and Protection, 2008. ICIMP'08. The …, 2008
On understanding normal protocol behaviour to monitor and mitigate the abnormal
2006
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
Using CLIPS to Detect Network Intrusions
2003
An environment for security protocol intrusion detection
Journal of Computer Security, 2002
PISA: automatic extraction of traffic signatures
2005
A PROPOSED INTRUSION ALERTS VERIFICATION AND CORRELATION MECHANISM