2013 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS)
Download PDF

Abstract

We present a basic tool for zero day attack signature extraction. Given two large sets of messages, P of messages captured in the network at peacetime (i.e., mostly legitimate traffic) and A captured during attack time (i.e., contains many attack messages), we present a tool for extracting a set S of strings, that are frequently found in A and not in P. Therefore, a packet containing one of the strings from S is likely to be an attack packet.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles