Sciweavers

Share
CCR
2004

Honeycomb: creating intrusion detection signatures using honeypots

11 years 11 months ago
Honeycomb: creating intrusion detection signatures using honeypots
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and protocol conformance checks on multiple levels in the protocol hierarchy to network traffic captured a honeypot system. We present results of running the system on an unprotected cable modem connection for 24 hours. The system successfully created precise traffic signatures that otherwise would have required the skills and time of a security officer to inspect the traffic manually.
Christian Kreibich, Jon Crowcroft
Added 16 Dec 2010
Updated 16 Dec 2010
Type Journal
Year 2004
Where CCR
Authors Christian Kreibich, Jon Crowcroft
Comments (0)
books