Download now Free registration required
Intrusion Detection System (IDS) detects an intrusion by comparing with its attack signatures. The generation of IDS signatures is based on the analysis of attack traffic, which is a result of exploiting vulnerabilities in a network protocol. Thus, the protocol analysis becomes an effective method to find out protocol vulnerabilities with regard to IDS. But the problem of protocol analysis in IDS is that how to detect all protocol vulnerability conditions in protocols. In this paper, the authors propose a novel framework to identify protocol vulnerability conditions by utilizing existing protocol analysis techniques.
- Format: PDF
- Size: 140.19 KB