Academic Journals Database
Disseminating quality controlled scientific knowledge

Constraint-based Trend Template for Intrusion Detection

Author(s): Md. Ahsan Habib | Krisna Prasad Pawdel | Mohammad Rajiullah | Prashanta Man Shrestha

Journal: Journal of Software
ISSN 1796-217X

Volume: 3;
Issue: 6;
Start page: 21;
Date: 2008;
Original page

Keywords: Intrusion detection system (IDS) | Trend Template (TT) | Trend Detector | Snort | DARPA

Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to recognize predefined attack signatures. Attack languages, also known as detection languages, are used to describe attack signatures. Detection languages should be simple, expressive and flexible enough to help encode event signature accurately and conveniently. This paper shows the effectiveness of constraint based Trend Template (TT) as an efficient detection language by encoding some attack scenarios and focusing on the Trend Detector which recognizes those signatures from intrusion data.
Save time & money - Smart Internet Solutions      Why do you need a reservation system?