Building intrusion pattern miner for Snort network intrusion detection system

被引:39
作者
Wuu, Lih-Chyau [1 ]
Hung, Chi-Hsiang [1 ]
Chen, Sout-Fong [1 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Dept Elect Engn, Yunlin, Taiwan
关键词
network-based intrusion detection; data mining; misuse detection; intrusion pattern; Snort NIDS;
D O I
10.1016/j.jss.2006.12.546
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we enhance the functionalities of Snort network-based intrusion detection system to automatically generate patterns of misuse from attack data, and the ability of detecting sequential intrusion behaviors. To that, we implement an intrusion pattern discovery module which applies data mining technique to extract single intrusion patterns and sequential intrusion patterns from a collection of attack packets, and then converts the patterns to Snort detection rules for on-line intrusion detection. In order to detect sequential intrusion behavior, the Snort detection engine is accompanied with our intrusion behavior detection engine. Intrusion behavior detection engine will create an alert when a series of incoming packets match the signatures representing sequential intrusion scenarios. (c) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:1699 / 1715
页数:17
相关论文
共 31 条
[11]  
*CERT CC, 1988, CERT COORD CTR
[12]   The dubious origins of the Sherman Antitrust Act: The mouse that roared [J].
Dickson, PR ;
Wells, PK .
JOURNAL OF PUBLIC POLICY & MARKETING, 2001, 20 (01) :3-14
[13]  
Ilgun K., 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.93CH3290-4), P16, DOI 10.1109/RISP.1993.287646
[14]  
Jiawei Han, 2000, SIGMOD Record, V29, P1, DOI 10.1145/335191.335372
[15]  
Lee W, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P79
[16]   A data mining framework for building intrusion detection models [J].
Lee, W ;
Stolfo, SJ ;
Mok, KW .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :120-132
[17]  
LEE W, 2000, ADAPTIVE INTRUSION D, P533
[18]  
LEE W, 2001, IEEE 2 DARPA INF SUR, P185
[19]  
Lee W., 1999, P 5 ACM SIGKDD INT C, DOI DOI 10.1145/312129.312212
[20]  
Lent B., 1997, Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, P227