ABSTRACT

Cyberinfrastructures are vulnerable due to design and implementation ¤aws, such as errors in the procedure, code, and design of the software. Malicious users attack system vulnerabilities by using a sequence of events, which helps them to break into a cyberinfrastructure. —ese events result in distinct characteristics that are deƒned as patterns of attack. Misuse/signature detection techniques target these patterns for further analysis in order to develop protection against or to stop such threats.