Automatic scheme to construct Snort rules from honeypots data
Journal of Systems Engineering and Electronics
Saved in:
Main Authors: | Li, X., Liu, D. |
---|---|
Other Authors: | COMPUTER SCIENCE |
Format: | Article |
Published: |
2013
|
Subjects: | |
Online Access: | http://scholarbank.nus.edu.sg/handle/10635/39721 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | National University of Singapore |
Similar Items
-
Real-Time emulation of intrusion victim in honeyfarm
by: He, X.-Y., et al.
Published: (2014) -
A program anomaly intrusion detection scheme based on fuzzy inference
by: Dau, Xuan Hoang
Published: (2014) -
An Ontology for SNORT Rule
by: Assadarat Khurat, et al.
Published: (2020) -
Abstract analysis of detection probability for statistically detecting DDoS attacks
by: Li, M., et al.
Published: (2013) -
An Intrusion Response Decision-Making Model Based on Hierarchical Task Network Planning
by: MU, Chengpo, et al.
Published: (2010)