Research Article
A Novel Algorithm for Intrusion Detection Based on RASL Model Checking
Table 4
Another comparison of different MC-based approaches for detecting telnet attacks.
| Attack actionsdetection results (if attacks are found) | ITL [2] | RASL | LTL [1] |
| Two attacks are launched at the same time point | Yes | Yes | No | The same attack is launched repeatedly times ( is a variable) | Yes | Yes | No | The same attack is launched repeatedly times ( is a given large constant) | Yes | Yes | No | The time distance between two actions is less than seconds | No | Yes | No |
|
|