Title :
Towards the attack signatures´ comparison in survivable computer networks
Author :
Manic, Milos ; Wilamowski, Bogdan
Author_Institution :
Dept. of Comput. Sci., Univ. of Idaho, Boise, ID, USA
Abstract :
Survivability architecture and run-time attack detection can be successfully implemented based on attack signatures. In this paper, the authors concentrate on profile signatures based on Markov models. They are represented by the frequency spectrum of the functionalities in the system. The difference between safe system signatures from attacked (monitored) system signatures indicates possible intrusion. This paper proposes an approach, based on soft computing techniques, for recognizing that difference
Keywords :
Markov processes; fault tolerant computing; fuzzy set theory; security of data; Markov models; attack signatures; attack signatures´ comparison; attacked system signatures; frequency spectrum; fuzzy satisfaction function; fuzzy set; monitored system signatures; profile signatures; run-time attack detection; safe system signatures; soft computing techniques; survivable computer networks; Computer architecture; Computer hacking; Computer networks; Computer science; Frequency; Intelligent networks; Intrusion detection; Monitoring; Runtime; Shape;
Conference_Titel :
Industrial Electronics Society, 2001. IECON '01. The 27th Annual Conference of the IEEE
Conference_Location :
Denver, CO
Print_ISBN :
0-7803-7108-9
DOI :
10.1109/IECON.2001.975601