A Review on Signature-Based Detection for Network Threats

被引:0
|
作者
Li, Jing [1 ]
Li, Qinyuan [1 ]
Zhou, Sheng [1 ]
Yao, Ying [1 ]
Ou, Jing [2 ,3 ]
机构
[1] Grid Zhejiang Elect Power Co, Elect Power Res Inst, Hangzhou, Zhejiang, Peoples R China
[2] Zhejiang Univ, Hangzhou, Zhejiang, Peoples R China
[3] Northwestern Polytech Univ, Hangzhou, Zhejiang, Peoples R China
来源
2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN) | 2017年
基金
中国国家自然科学基金;
关键词
signature-based detection; feature extraction; codes preprocessing; matching algorithms; INTRUSION DETECTION;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, the attacks on the Internet are becoming more complex, advanced and concealed. A large number of security threats arise. The signature-based detection technology is efficient and simple which is widely used for malicious codes detection system. In this paper, we firstly focus on the principle of the method, and summarize the specific steps to implement it, especially feature extraction, codes preprocessing, and matching algorithms. Then we discuss the features and improvements for the method, and the application. Finally, more detection technologies are introduced.
引用
收藏
页码:1117 / 1121
页数:5
相关论文
共 50 条
  • [1] Variables influencing the effectiveness of signature-based network intrusion detection systems
    Sommestad, Teodor
    Holm, Hannes
    Steinvall, Daniel
    INFORMATION SECURITY JOURNAL, 2022, 31 (06): : 711 - 728
  • [2] Analysis of update delays in signature-based network intrusion detection systems
    Gascon, Hugo
    Orfila, Agustin
    Blasco, Jorge
    COMPUTERS & SECURITY, 2011, 30 (08) : 613 - 624
  • [3] Pre-decision detection engine for signature-based network intrusion detection system
    College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
    Zhejiang Daxue Xuebao (Gongxue Ban), 2006, 10 (1701-1704):
  • [4] Applying hardware-based machine learning to signature-based network intrusion detection
    Payer, Garrett
    McCormick, Chris
    Harang, Richard
    CYBER SENSING 2014, 2014, 9097
  • [5] Signature-based portfolio allocation: a network approach
    Gregnanin, Marco
    Zhang, Yanyi
    De Smedt, Johannes
    Gnecco, Giorgio
    Parton, Maurizio
    APPLIED NETWORK SCIENCE, 2024, 9 (01)
  • [6] Applying hardware-based machine learning to signature-based network intrusion detection
    Payer, Garrett
    McCormick, Chris
    Harang, Richard
    MACHINE INTELLIGENCE AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS VIII, 2014, 9119
  • [7] RF and Network Signature-based Machine Learning on Detection of Wireless Controlled Drone
    Teoh, Yan Jun John
    Seow, Chee Kiat
    2019 PHOTONICS & ELECTROMAGNETICS RESEARCH SYMPOSIUM - SPRING (PIERS-SPRING), 2019, : 408 - 417
  • [8] Multiresolution signature-based SAR target detection
    McClure, M
    Bharadwaj, P
    Carin, L
    ALGORITHMS FOR SYNTHETIC APERTURE RADAR IMAGERY V, 1998, 3370 : 318 - 329
  • [9] A Comparison of Neural-Network-Based Intrusion Detection against Signature-Based Detection in IoT Networks
    Schroetter, Max
    Niemann, Andreas
    Schnor, Bettina
    INFORMATION, 2024, 15 (03)
  • [10] Signature-based IaaS Performance Change Detection
    Fattah, Sheik mohammad mostakim
    Bouguettaya, Athman
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2025, 25 (01)