A Rule Generation Method With High Understandability Against Obfuscated Attack Patterns in Log4Shell for IPS and IDS Based on Given Obfuscation Techniques.
Yudai YamamotoShingo YamaguchiPublished in: GCCE (2023)
Keyphrases
- generation method
- reverse engineering
- intrusion detection
- association rules
- alert correlation
- attack scenarios
- data mining techniques
- design patterns
- pattern discovery
- intrusion detection system
- countermeasures
- data structure
- normal traffic
- frequent patterns
- grammar rules
- network intrusions
- rules discovered
- normal behavior
- rule mining
- rule discovery
- control flow
- active databases