An Ontology for SNORT Rule

被引:0
|
作者
Khurat, Assadarat [1 ]
Sawangphol, Wudhichart [1 ]
机构
[1] Mahidol Univ, Fac Informat & Commun Technol, Bangkok, Thailand
关键词
SNORT; IDS; Ontology; Description Logic;
D O I
10.1109/jcsse.2019.8864190
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Intrusion Detection System (IDS) is an important component to provide security for an organization. Its main function is to detect harmful traffic. The detection is done based on rules. SNORT is a widely used open-source IDS system. To have efficient detection, SNORT rule specification allows very expressive way to create a rule. This is not a trivial task especially for self-defined rule. Due to this complexity and huge amount of rules, there can be problems about both syntax and semantics which in turn effects on the IDS system performance. We thus propose an ontology for SNORT rules which is designed to support SNORT rule verification using OWL ontology.
引用
收藏
页码:49 / +
页数:7
相关论文
共 50 条
  • [1] AUTOMATION SNORT RULE FOR XSS DETECTION WITH HONEYPOT
    Syaifuddin
    Risqiwati, Diah
    Sidharta, Hanugra Aulia
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI 2018), 2018, : 584 - 588
  • [2] Efficient rule-matching algorithms on snort
    Department of Computer, School of Electronic Information Engineering, Dalian University of Technology, Dalian 116023, China
    Jisuanji Gongcheng, 2006, 18 (155-156+213):
  • [3] Snort Rule Detection for Countering in Network Attacks
    Somu, Venkateswarlu
    Kamesh, D. B. K.
    Sastry, J. K. R.
    Sitara, S. N. M.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 573 - 583
  • [4] Rule generalisation in intrusion detection systems using SNORT
    Aickelin, Uwe
    Twycross, Jamie
    Hesketh-Roberts, Thomas
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) : 101 - 116
  • [5] Automatic SNORT IDS Rule Generation Based on Honeypot Log
    Sagala, Albert
    2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE), 2015, : 576 - 580
  • [6] The investigation on cowrie honeypot logs in establishing rule signature snort
    Satria, E.
    Huda, T. P. S.
    Iqbal, M.
    Sarjana, F. W.
    2ND INTERNATIONAL CONFERENCE ON AGRICULTURAL TECHNOLOGY, ENGINEERING AND ENVIRONMENTAL SCIENCES, 2021, 644
  • [7] The Utilization of Ontology in Association Rule
    Wardani, Dewi
    Khusyaini, Achmad
    3RD FORUM IN RESEARCH, SCIENCE, AND TECHNOLOGY (FIRST 2019) INTERNATIONAL CONFERENCE, 2020, 1500
  • [8] MEASURING INCONSISTENCY IN A NETWORK INTRUSION DETECTION RULE SET BASED ON SNORT
    Mcareavey, Kevin
    Liu, Weiru
    Miller, Paul
    Mu, Kedian
    INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2011, 5 (03) : 281 - 322
  • [9] ECA rule ontology - Modelling prescriptive rules as descriptive ontology
    Kabilan, Vandana
    Svan, Pemilla
    WEBIST 2007: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL WIA: WEB INTERFACES AND APPLICATIONS, 2007, : 408 - +
  • [10] The Implementation of Rule-Based Early Warning System in Snort Through Email
    Goel, Aaruni
    Vasistha, A. K.
    INNOVATIONS IN ELECTRONICS AND COMMUNICATION ENGINEERING, 2019, 33 : 383 - 391