Protecting Run-time Filters for Network Intrusion Detection Systems

被引:3
|
作者
Valgenti, Victor C. [1 ]
Sun, Hai [2 ]
Kim, Min Sik [1 ]
机构
[1] Petabi Inc, Irvine, CA 92612 USA
[2] Washington State Univ, Dept EECS, Pullman, WA 99163 USA
关键词
Security; Network Security; Filters; Run-time Filters; IDS; Intrusion Detection; Deep Packet Inspection;
D O I
10.1109/AINA.2014.19
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection Systems (NIDS) examine millions of network packets searching for malicious traffic. Multi-gigabit line-speeds combined with growing databases of rules lead to dropped packets as the load exceeds the capacity of the device. Several areas of research have attempted to mitigate this problem through improving packet inspection efficiency, increasing resources, or reducing the examined population. A popular method for reducing the population examined is to employ run-time filters that can provide a quick check to determine that a given network packet cannot match a particular rule set. While this technique is an excellent method for reducing the population under examination, rogue elements can trivially bypass such filters with specially crafted packets and render the run-time filters effectively useless. Since the filtering comes at the cost of extra processing a filtering solution could actually perform worse than a non-filtered solution under such pandemic circumstances. To defend against such attacks, it is necessary to consider run-time filters as an independent anomaly detector capable of detecting attacks against itself. Such anomaly detection, together with judicious rate-limiting of traffic forwarded to full packet inspection, allows the detection, logging, and mitigation of attacks targeted at the filters while maintaining the overall improvements in NIDS performance garnered from using run-time filters.
引用
收藏
页码:116 / 122
页数:7
相关论文
共 50 条
  • [1] Run-time detection of covert channels
    Nagatou, Naoyuki
    Watanabe, Takuo
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 577 - +
  • [2] The Importance of Run-Time Error Detection
    Luecke, Glenn R.
    Coyle, James
    Hoekstra, James
    Kraeva, Marina
    Xu, Ying
    Park, Mi-Young
    Kleiman, Elizabeth
    Weiss, Olga
    Wehe, Andre
    Yahya, Melissa
    [J]. TOOLS FOR HIGH PERFORMANCE COMPUTING 2009, 2010, : 145 - 155
  • [3] A Framework for Run-time Reconfigurable Systems
    Michael Eisenring
    Marco Platzner
    [J]. The Journal of Supercomputing, 2002, 21 : 145 - 159
  • [4] Reprogramming Embedded Systems at Run-Time
    Oliver, Richard
    Wilde, Adriana
    Zaluska, Ed
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2014, 7 (05):
  • [5] A framework for run-time reconfigurable systems
    Eisenring, M
    Platzner, M
    [J]. JOURNAL OF SUPERCOMPUTING, 2002, 21 (02): : 145 - 159
  • [6] Run-time system for scalable network services
    Shevade, Upendra
    Kokku, Ravi
    Vin, Harrick M.
    [J]. 27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 2485 - +
  • [7] Run-time Updating of Network Device Drivers
    Tanaka, Hiroyuki
    Nomura, Yoshinari
    Taniguchi, Hideo
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 446 - 450
  • [8] Run-time guarantees for real-time systems
    Wilhelm, R
    [J]. FORMAL MODELING AND ANALYSIS OF TIMED SYSTEMS, 2003, 2791 : 166 - 167
  • [9] PROTECTING INFRASTRUCTURE ASSETS FROM REAL-TIME AND RUN-TIME THREATS
    Jenkins, Jonathan
    Burmester, Mike
    [J]. CRITICAL INFRASTRUCTURE PROTECTION VII, 2013, 417 : 97 - 110
  • [10] Run-time detection in parallel and distributed systems: Application to safety-critical systems
    Plale, B
    Schwan, K
    [J]. 19TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 1999, : 163 - 170