Abstract: Intrusion detection systems (IDS) are one way to tackle the increasing number of attacks that exploit software vulnerabilities.
This paper presents a new approach to automatically generate a dedicated and customized IDS from C sources targeting multi-threaded programs. We use Petri Nets ...
We use Petri Nets to benefit from a formal description able to compactly describe parallel behaviors. Obtained models can then be enhanced with extra ...
... Based on the analysis technology of Petri nets and the temporal logic, the safety and liveness properties of concurrent programs can be analyzed. Voron et ...
People also ask
What is a network-based intrusion detection system?
What are the two main types of intrusion detection systems based on detection methodology?
What are the two most common implementations of intrusion detection systems?
What is one of the main approaches to intrusion detection based on?
This paper proposed a Petri net-based framework of IDSes, which consists of two primary functions: detection and updating, and showed the effectiveness of ...
A Petri Net-based Framework of Intrusion Detection Systems
www.researchgate.net › publication › 28...
Feb 25, 2016 · In the detection function, we first model an attacker's behavior as a Petri net, and then use the model to detect attacks. In the updating ...
Dec 11, 2024 · The LSTM–Petri Net approach is an innovative solution combining machine learning with formal network modeling for enhanced threat detection, ...
Sep 13, 2024 · An IDS (intrusion detection system) keeps an eye on all of a network's data packets for any signs of unusual behavior and sends out warnings ...
We use Petri Nets to benefit from a formal description able to compactly describe parallel behaviors. Obtained models can then be enhanced with extra ...
Adaptable Intrusion Detection Systems Dedicated to Concurrent Programs: A Petri Net-Based Approach pp. 57-66. An Asynchronous Routing Algorithm for Clos ...