Protection in operating systems
Communications of the ACM
Mimicry attacks on host-based intrusion detection systems
Proceedings of the 9th ACM conference on Computer and communications security
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Intrusion Detection: A Bioinformatics Approach
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment
CSSE '08 Proceedings of the 2008 International Conference on Computer Science and Software Engineering - Volume 03
Hi-index | 0.00 |
The paper addresses to application of sequences alignment intellectual algorithms for the intrusion detection needs. These algorithms are used in bioinformatics to detect regions of similarity in several gene sequences. We propose two techniques of their utilization. Using the first technique it is possible to detect the mutations of attack, having a signature of it. The second technique is applicable to anomaly detection. We discuss what algorithms of sequences alignment can be used in these methods and show the effectiveness of these techniques on practice.