Rule generalisation in intrusion detection systems using SNORT

被引:13
作者
Aickelin, Uwe [1 ]
Twycross, Jamie [1 ]
Hesketh-Roberts, Thomas [1 ]
机构
[1] Univ Nottingham, Sch Comp Sci & IT, Nottingham NG8 1BB, England
基金
英国工程与自然科学研究理事会;
关键词
anomaly detection; intrusion detection; SNORT; SNORT rules;
D O I
10.1504/IJESDF.2007.013596
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks. An IDS's responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and SNORT is one popular and actively developing open-source IDS that uses such a set of signatures known as SNORT rules. Our aim is to identify a way in which SNORT could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current SNORT rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard data sets and show that we are able to detect previously undetected variants of various attacks.
引用
收藏
页码:101 / 116
页数:16
相关论文
共 14 条
[1]  
Axelsson S., 2000, INTRUSION DETECTION, P99
[2]   Probabilistic anomaly detection in distributed computer networks [J].
Burgess, M .
SCIENCE OF COMPUTER PROGRAMMING, 2006, 60 (01) :1-26
[3]  
Crothers T., 2003, IMPLEMENTING INTRUSI
[4]   A formal framework for positive and negative detection schemes [J].
Esponda, F ;
Forrest, S ;
Helman, P .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2004, 34 (01) :357-373
[5]  
FULLER V, 1993, 1519 RFC
[6]  
Gomez F., 2003, P IEEE INT C FUZZ SY
[7]  
Hoagland J., 2003, VIEWING IDS ALERTS L
[8]  
Kim J., NATURAL COMPUTING
[9]  
Lawton G., 2002, OPEN SOURCE SECURITY
[10]  
Mitchell T., 1997, MACH LEARN