Generation of Attack Scenarios for Evaluating IDS

Download Now
Provided by: International Journal of Engineering and Technology
Topic: Security
Format: PDF
The authors focus in this paper to improve the level of Intrusion Detection System (IDS). This improvement is based on three research areas: classification of attacks, generation of attack scenarios and finally evaluation methods. They will discuss in this paper the second area, which consists on the research of meaningful scenarios in order to minimize false and positive alerts reported by an IDS. They will present two algorithms generating these scenarios. The first one allows the conversion of the problem to a Constraint Programming Problem (CSP) and the second one is based on an algorithm to search the shortest path.
Download Now

Find By Topic