In this preliminary study, we investigate how inconsistency in a network intrusion de-tection rule set can be measured. To achieve this, we first examine the structure of these rules which are based on Snort and incorporate regular expression (Regex) pattern matching. We then identify primitive elements in these rules in order to translate the rules into their (equivalent) logical forms and to establish connections between them. Additional rules from background knowledge are also introduced to make the correla-tions among rules more explicit. We measure the degree of inconsistency in formulae of such a rule set (using the Scoring function, Shapley inconsistency values and Blame measure for prioritized knowledge) and compare the informativen...
Network intrusion is one of the most serious threats to network infrastructure and digital assets. I...
Network security has become a vital part for computer networks to ensure that they operate as expect...
Abstract — The manual forensics investigation of security in-cidents is an opaque process that invol...
In this preliminary study, we investigate how inconsistency in a network intrusion detection rule se...
Abstract—In this preliminary case study, we investigate how inconsistency in a network intrusion det...
Contemporary organizations often employ signature-based network intrusion detection systems to incre...
Notwithstanding the predicted demise of signature-based network monitoring, it is still part of the ...
As the use of the Internet has increased tremendously, the network traffic involved in malicious act...
Intrusion Detection Systems (IDSs) provide an importantlayer of security for computer systems and ne...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
Currently, intrusion detection system has become widely used as a network perimeter security. The us...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
a suite of data mining techniques to automatically detect attacks against computer net-works and sys...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Many organizations and businesses are all delving into crafting out an online presence for themselve...
Network intrusion is one of the most serious threats to network infrastructure and digital assets. I...
Network security has become a vital part for computer networks to ensure that they operate as expect...
Abstract — The manual forensics investigation of security in-cidents is an opaque process that invol...
In this preliminary study, we investigate how inconsistency in a network intrusion detection rule se...
Abstract—In this preliminary case study, we investigate how inconsistency in a network intrusion det...
Contemporary organizations often employ signature-based network intrusion detection systems to incre...
Notwithstanding the predicted demise of signature-based network monitoring, it is still part of the ...
As the use of the Internet has increased tremendously, the network traffic involved in malicious act...
Intrusion Detection Systems (IDSs) provide an importantlayer of security for computer systems and ne...
Network intrusion detection is a task aimed to identify malicious network traffic. Malicious network...
Currently, intrusion detection system has become widely used as a network perimeter security. The us...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
a suite of data mining techniques to automatically detect attacks against computer net-works and sys...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
Many organizations and businesses are all delving into crafting out an online presence for themselve...
Network intrusion is one of the most serious threats to network infrastructure and digital assets. I...
Network security has become a vital part for computer networks to ensure that they operate as expect...
Abstract — The manual forensics investigation of security in-cidents is an opaque process that invol...