In this preliminary study, we investigate how inconsistency in a network intrusion detection rule set can be measured. To achieve this, we first examine the structure of these rules which are based on Snort and incorporate regular expression (Regex) pattern matching. We then identify primitive elements in these rules in order to translate the rules into their (equivalent) logical forms and to establish connections between them. Additional rules from background knowledge are also introduced to make the correlations among rules more explicit. We measure the degree of inconsistency in formulae of such a rule set (using the Scoring function, Shapley inconsistency values and Blame measure for prioritized knowledge) and compare the informativenes...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
In the current digital age, a pervasive shift towards digitalization is evident in all aspects of li...
Nowadays, the majority of corporations mainly use signature-based intrusion detection. This trend is...
In this preliminary study, we investigate how inconsistency in a network intrusion de-tection rule s...
Abstract—In this preliminary case study, we investigate how inconsistency in a network intrusion det...
Intrusion Detection Systems (IDSs) provide an importantlayer of security for computer systems and ne...
Contemporary organizations often employ signature-based network intrusion detection systems to incre...
The intrusion detection system (IDS) is an important network security tool for securing computer and...
Currently, intrusion detection system has become widely used as a network perimeter security. The us...
Intrusion Detection System (IDS) is a vital network security tool for protecting the network systems...
As the use of the Internet has increased tremendously, the network traffic involved in malicious act...
Notwithstanding the predicted demise of signature-based network monitoring, it is still part of the ...
Network security has become a vital part for computer networks to ensure that they operate as expect...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
In the current digital age, a pervasive shift towards digitalization is evident in all aspects of li...
Nowadays, the majority of corporations mainly use signature-based intrusion detection. This trend is...
In this preliminary study, we investigate how inconsistency in a network intrusion de-tection rule s...
Abstract—In this preliminary case study, we investigate how inconsistency in a network intrusion det...
Intrusion Detection Systems (IDSs) provide an importantlayer of security for computer systems and ne...
Contemporary organizations often employ signature-based network intrusion detection systems to incre...
The intrusion detection system (IDS) is an important network security tool for securing computer and...
Currently, intrusion detection system has become widely used as a network perimeter security. The us...
Intrusion Detection System (IDS) is a vital network security tool for protecting the network systems...
As the use of the Internet has increased tremendously, the network traffic involved in malicious act...
Notwithstanding the predicted demise of signature-based network monitoring, it is still part of the ...
Network security has become a vital part for computer networks to ensure that they operate as expect...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
In the current digital age, a pervasive shift towards digitalization is evident in all aspects of li...
Nowadays, the majority of corporations mainly use signature-based intrusion detection. This trend is...