Research Article
A Novel Algorithm for Intrusion Detection Based on RASL Model Checking
Table 5
Comparison of different MC-based approaches for detecting password attacks.
| Attack actionsdetection results (if attacksare found) | ITL [2] | RASL | LTL [1] |
| Consecutive/inconsecutive attack: success after connection failed times ( is a given large constant) | Yes | Yes | No | Every time distance between attacks is less than seconds ( is a given small constant) | No | Yes | No |
|
|