Vis enkel innførsel

dc.contributor.authorChitrakar, Ambika Shrestha
dc.contributor.authorPetrovic, Slobodan
dc.date.accessioned2019-05-20T09:07:17Z
dc.date.available2019-05-20T09:07:17Z
dc.date.created2018-09-26T15:00:33Z
dc.date.issued2018
dc.identifier.citationIFIP Advances in Information and Communication Technology. 2018, 532 141-160.nb_NO
dc.identifier.issn1868-4238
dc.identifier.urihttp://hdl.handle.net/11250/2597973
dc.description.abstractIntrusion detection systems are defensive tools that identify malicious activities in networks and hosts. In network forensics, investigators often study logs that store alerts generated by intrusion detection systems. This research focuses on Snort, a widely-used, open-source, misuse-based intrusion detection system that detects network intrusions based on a pre-defined set of attack signatures. When a security breach occurs, a forensic investigator typically starts by examining network log files. However, Snort cannot detect unknown attacks (i.e., zero-day attacks) even when they are similar to known attacks; as a result, an investigator may lose evidence in a criminal case. This chapter demonstrates the ease with which it is possible to defeat the detection of malicious activity by Snort and the possibility of using constrained approximate search algorithms instead of the default Snort search algorithm to collect evidence. Experimental results of the performance of constrained approximate search algorithms demonstrate that they are capable of detecting previously unknown attack attempts that are similar to known attacks. While the algorithms generate additional false positives, the number of false positives can be reduced by the careful choice of constraint values in the algorithms.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.titleCollecting Network Evidence Using Constrained Approximate Search Algorithmsnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionpublishedVersionnb_NO
dc.source.pagenumber141-160nb_NO
dc.source.volume532nb_NO
dc.source.journalIFIP Advances in Information and Communication Technologynb_NO
dc.identifier.doi10.1007/978-3-319-99277-8_9
dc.identifier.cristin1614168
dc.description.localcodeThis chapter will not be available due to copyright restrictions © 2018 by Springer Verlagnb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel