会议专题

Generation of attack scenarios for evaluating IDS

We focus in this paper to improve the level of intrusion detection system (IDS). This improvement is based on three research areas: classification of attacks, generation of attack scenarios and finally evaluation methods. We will discuss in this article the second area, which consists on the research of meaningful scenarios in order to minimize false and positive alerts reported by an IDS. We will present two algorithms generating these scenarios. The first one allows the conversion of the problem to a constraint programming problem (CSP) and the second one is based on an algorithm to search the shortest path. We will also compare the results of these two algorithms.

component Scenario Attack Evaluation IDS CSP CHOCO

Mohammed SABER Toumi BOUCHENTOUF Abdelhamid BENAZZI

Department of Computer Science, National School of Applied Sciences Mohammed First University Oujda, Department of Computer Science, High School of Technology Mohammed First University Oujda, Morocco

国际会议

2011 International Conference on Security Science and Technology(ICSST 2011) (2011年安全科学与技术国际会议)

重庆

英文

116-120

2011-01-21(万方平台首次上网日期,不代表论文的发表时间)