Building intrusion pattern miner for Snort network intrusion detection system

被引:39
作者
Wuu, Lih-Chyau [1 ]
Hung, Chi-Hsiang [1 ]
Chen, Sout-Fong [1 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Dept Elect Engn, Yunlin, Taiwan
关键词
network-based intrusion detection; data mining; misuse detection; intrusion pattern; Snort NIDS;
D O I
10.1016/j.jss.2006.12.546
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we enhance the functionalities of Snort network-based intrusion detection system to automatically generate patterns of misuse from attack data, and the ability of detecting sequential intrusion behaviors. To that, we implement an intrusion pattern discovery module which applies data mining technique to extract single intrusion patterns and sequential intrusion patterns from a collection of attack packets, and then converts the patterns to Snort detection rules for on-line intrusion detection. In order to detect sequential intrusion behavior, the Snort detection engine is accompanied with our intrusion behavior detection engine. Intrusion behavior detection engine will create an alert when a series of incoming packets match the signatures representing sequential intrusion scenarios. (c) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:1699 / 1715
页数:17
相关论文
共 31 条
[1]  
AGRAWAL R, 1995, PROC INT CONF DATA, P3, DOI 10.1109/ICDE.1995.380415
[2]  
Agrawal R., 1994, Proceedings of the 20th International Conference on Very Large Data Bases. VLDB'94, P487
[3]  
[Anonymous], P IEEE WORKSH INF AS
[4]  
[Anonymous], 2006, 1 INT C AV REL SEC
[5]  
[Anonymous], P 3 ANN C PRIV SEC T
[6]  
[Anonymous], ACM SIGOPS OPERATING
[7]  
[Anonymous], THESIS COLUMBIA U
[8]  
Ayres J., 2002, Proceedings of the 8th ACM International Conference on Knowledge Discovery and Data Mining, P429, DOI 10.1145/775047.775109
[9]  
Bloedorn E, 2001, DATA MINING NETWORK
[10]  
BOLZONI D, 2006, ANOMALYBASED NETWORK