DocumentCode :
3061998
Title :
A Study of Intrusion Signature Based on Honeypot
Author :
Tian, Jun-feng ; Wang, Jian-Ling ; Yang, Xiao-Hui ; Li, Ren-Ling
Author_Institution :
Hebei University, Baoding, China
fYear :
2005
fDate :
05-08 Dec. 2005
Firstpage :
125
Lastpage :
129
Abstract :
To meet network security requirement, the model of SISH (Study of Intrusion Signature based on Honeypot) takes advantage of honeypot technology to collect the activities of attackers on the honeypot. According to information replied from the honeypot, and data captured on the network, one can reproduce the attack with attack tree. Having classified the attack information of the attacked objects, one can create the signature of the intrusion data in the same class by LCS(Longest Common Sub-string) algorithm. new signatures are used to enrich the signature database of the IDS to make up for the deficiency of the IDSs and perfect defense system.
Keywords :
Computer hacking; Computer networks; Data security; Educational institutions; Electronic mail; Intrusion detection; Libraries; Mathematics; Production; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Parallel and Distributed Computing, Applications and Technologies, 2005. PDCAT 2005. Sixth International Conference on
Print_ISBN :
0-7695-2405-2
Type :
conf
DOI :
10.1109/PDCAT.2005.51
Filename :
1578880
Link To Document :
بازگشت