Design and Implementation of an Open Signature Database for Network Attack

WEN Shi-qiang,DUAN Hai-xin,WU Jian-ping
DOI: https://doi.org/10.3969/j.issn.1000-1220.2006.01.005
2006-01-01
Abstract:For the globalization of network attack, intrusion detection systems (IDS) should protect not only a local sub-net, but the whole network environment. Therefore, an urgent requirement of open resources for intrusion detection is coming to being. An open signature database for IDS has been implemented in the effort of this paper, which includes more than 1200 effective signatures. In this paper, the Intrusion Signature Exchange Protocol (ISEP) is presented, which has been used by IDSes to update signatures from the database in real time. Digital certificate and role-based access control technique involved in the system is described. Finally, in the case study of Nachi worm, the method of signature extraction is illustrated.
What problem does this paper attempt to address?