To search, Click below search items.


All Published Papers Search Service


Generation of attack scenarios by modeling CSP for Evaluating and Testing Intrusion Detection System


Mohammed Saber, Toumi Bouchentouf, Mohammed Ghaouth Belkasmi, Abdelhamid Benazzi


Vol. 10  No. 11  pp. 93-98


We focus in this paper to improve the level of intrusion detection system (IDS). This improvement is based on three research areas: classification of attacks, generation of attack scenarios and finally the evaluation methods. We will discuss in this article the second area, which is to seek meaningful scenarios to minimize the false and positive alerts reported by an IDS. We present a model of the generation of these scenarios based on constraint programming (CSP). The implementation will be done using the Java based library CHOCO.


IDS, Evaluation, Attack, Scenario, CSP, CHOCO, Java