Skip to main content

Showing 1–1 of 1 results for author: Guide, R

Searching in archive cs. Search in all archives.
.
  1. Characterizing the Modification Space of Signature IDS Rules

    Authors: Ryan Guide, Eric Pauley, Yohan Beugin, Ryan Sheatsley, Patrick McDaniel

    Abstract: Signature-based Intrusion Detection Systems (SIDSs) are traditionally used to detect malicious activity in networks. A notable example of such a system is Snort, which compares network traffic against a series of rules that match known exploits. Current SIDS rules are designed to minimize the amount of legitimate traffic flagged incorrectly, reducing the burden on network administrators. However,… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: Published in: MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)