License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.08102.4
URN: urn:nbn:de:0030-drops-14955
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2008/1495/
Go to the corresponding Portal


Daciér, Marc ; Debar, Hervé ; Holz, Thorsten ; Kirda, Engin ; Kohlrausch, Jan ; Kruegel, Christopher ; Rieck, Konrad ; Sterbenz, James

4. 8102 Working Group -- Attack Taxonomy

pdf-format:
08102.SWM.Paper.1495.pdf (0.03 MB)


Abstract

The starting point of this working group was the question about the kinds of attacks that can be detected by inspecting in network traffic. In general, we identified four major problems that network-based intrusion detection systems are facing:
1. Encrypted network traffic
2. Application-level attacks
3. Performance
4. Evasion attack.

BibTeX - Entry

@InProceedings{dacier_et_al:DagSemProc.08102.4,
  author =	{Daci\'{e}r, Marc and Debar, Herv\'{e} and Holz, Thorsten and Kirda, Engin and Kohlrausch, Jan and Kruegel, Christopher and Rieck, Konrad and Sterbenz, James},
  title =	{{4. 8102 Working Group – Attack Taxonomy}},
  booktitle =	{Perspectives Workshop: Network Attack Detection and Defense},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8102},
  editor =	{Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/opus/volltexte/2008/1495},
  URN =		{urn:nbn:de:0030-drops-14955},
  doi =		{10.4230/DagSemProc.08102.4},
  annote =	{Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}

Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma
Freie Schlagwörter (deutsch): network monitoring, flow analysis, denial of service detection and response, event correlation
Collection: 08102 - Perspectives Workshop: Network Attack Detection and Defense
Issue Date: 2008
Date of publication: 20.05.2008


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI