Journal of Software Engineering and Applications

Volume 1, Issue 1 (December 2008)

ISSN Print: 1945-3116   ISSN Online: 1945-3124

Google-based Impact Factor: 1.22  Citations  h5-index & Ranking

An Algorithm for Generation of Attack Signatures Based on Sequences Alignment

HTML  Download Download as PDF (Size: 594KB)  PP. 76-82  
DOI: 10.4236/jsea.2008.11011    5,193 Downloads   9,320 Views  Citations

Affiliation(s)

ABSTRACT

This paper presents a new algorithm for generation of attack signatures based on sequence alignment. The algorithm is composed of two parts: a local alignment algorithm-GASBSLA (Generation of Attack Signatures Based on Sequence Local Alignment) and a multi-sequence alignment algorithm-TGMSA (Tri-stage Gradual Multi-Sequence Alignment). With the inspiration of sequence alignment used in Bioinformatics, GASBSLA replaces global alignment and constant weight penalty model by local alignment and affine penalty model to improve the generality of attack signatures. TGMSA presents a new pruning policy to make the algorithm more insensitive to noises in the generation of attack signatures. In this paper, GASBSLA and TGMSA are described in detail and validated by experiments.

Share and Cite:

N. Li, C. Xia, Y. Yang and H. Wang, "An Algorithm for Generation of Attack Signatures Based on Sequences Alignment," Journal of Software Engineering and Applications, Vol. 1 No. 1, 2008, pp. 76-82. doi: 10.4236/jsea.2008.11011.

Cited by

[1] Bioinspired Intrusion Detection in ITC Infrastructures
2020
[2] ERES: an extended regular expression signature for polymorphic worm detection
2019
[3] Automatic signature generation for polymorphic worms by combination of token extraction and sequence alignment approaches
Information and Knowledge Technology (IKT), 2015 7th Conference on, 2015
[4] Novel Metrics for Bug Triage
Journal of Software, 2014
[5] Generating malware signature using transcoding from sequential data to amino acid sequence
High Performance Computing and Simulation (HPCS), 2013 International Conference on, 2013
[6] Intellectual intrusion detection with sequences alignment methods
Computer Network Security, 2010
[7] 木马网络通信特征提取模型的设计与实现
计算机工程与设计, 2010
[8] A New Type of Self-Adaptive Mechanism for Network Survivability Based on Intrusion Deception
Future Generation Communication and Networking, 2008. FGCN'08. Second International Conference on, 2008

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.