To search, Click
below search items.
|
|

All
Published Papers Search Service
|
Title
|
Generation of attack scenarios by modeling CSP for Evaluating and Testing Intrusion Detection System
|
Author
|
Mohammed Saber, Toumi Bouchentouf, Mohammed Ghaouth Belkasmi, Abdelhamid Benazzi
|
Citation |
Vol. 10 No. 11 pp. 93-98
|
Abstract
|
We focus in this paper to improve the level of intrusion detection system (IDS). This improvement is based on three research areas: classification of attacks, generation of attack scenarios and finally the evaluation methods. We will discuss in this article the second area, which is to seek meaningful scenarios to minimize the false and positive alerts reported by an IDS. We present a model of the generation of these scenarios based on constraint programming (CSP). The implementation will be done using the Java based library CHOCO.
|
Keywords
|
IDS, Evaluation, Attack, Scenario, CSP, CHOCO, Java
|
URL
|
http://paper.ijcsns.org/07_book/201011/20101115.pdf
|
|