An Automatic Generation Alignment of Attack Signatures Based on Rule Matching Degree
暂无分享,去创建一个
[1] Ya-Wen Lin,et al. Simulating Exploits for the Creation and Refinement of Detection Signatures , 2017, 2017 IEEE 25th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS).
[2] Dharmaraj R. Patil,et al. Implementation of network intrusion detection system using variant of decision tree algorithm , 2015, 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE).
[3] S. B. Needleman,et al. A general method applicable to the search for similarities in the amino acid sequence of two proteins. , 1970, Journal of molecular biology.
[4] Tang Yong. Noise-tolerant approach for automatically generating signatures of network attacks , 2009 .
[5] M S Waterman,et al. Identification of common molecular subsequences. , 1981, Journal of molecular biology.
[6] B. M. A. Al-Maqaleh. Genetic Algorithm Approach to Automated Discovery of Comprehensible Production Rules , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[7] Hu Yong-gang. Approach for attack signatures generating based on SVM and sequence alignment , 2012 .
[8] Amol Borkar,et al. A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS) , 2017, 2017 International Conference on Inventive Computing and Informatics (ICICI).
[9] Christus,et al. A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins , 2022 .
[10] Hossain Shahriar,et al. Towards an Attack Signature Generation Framework for Intrusion Detection Systems , 2017, 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).