13.07.2015 Views

Chapter 11 Intrusion Detection System

Chapter 11 Intrusion Detection System

Chapter 11 Intrusion Detection System

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Signature Generation Research challenge : fast, automatic extraction ofsignatures for new attacks¡ honeypots are useful for attracting attacks to generate signatures Attack signatures are usually very specific¡ automated engines now generate unlimited variants of a single attack¡ program obfuscation, self-decrypting code Possible response : find attack characteristics that aredifficult to conceal / obfuscateSecurity Spring 2013

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!