Research Article
A Novel Algorithm for Intrusion Detection Based on RASL Model Checking
Table 3
A comparison of different MC-based approaches for detecting telnet attacks.
| Attack actionsdetection results (if attacks are found) | ITL [2] | RASL | LTL [1] |
| Make a backdoor after/before/while close firewall | Yes | Yes | No | There exists an/no overlap timed interval between two actions | Yes | Yes | No | The time distance between two actions is less than seconds | No | Yes | No |
|
|