Using Partial Signatures in Intrusion Detection for Multipath TCP

被引:1
|
作者
Afzal, Zeeshan [1 ]
Garcia, Johan [1 ]
Lindskog, Stefan [1 ]
Brunstrom, Anna [1 ]
机构
[1] Karlstad Univ, Karlstad, Sweden
来源
关键词
D O I
10.1007/978-3-030-35055-0_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional security mechanisms such as signature based intrusion detection systems (IDSs) attempt to find a perfect match of a set of signatures in network traffic. Such IDSs depend on the availability of a complete application data stream. With emerging protocols such as Multipath TCP (MPTCP), this precondition cannot be ensured, resulting in false negatives and IDS evasion. On the other hand, if approximate signature matching is used instead in an IDS, a potentially high number of false positives make the detection impractical. In this paper, we show that, by using a specially tailored partial signature matcher and knowledge about MPTCP semantics, the Snort3 IDS can be empowered with partial signature detection. Additionally, we uncover the type of Snort3 rules suitable for the task of partial matching. Experimental results with these rules show a low false positive rate for benign traffic and high detection coverage for attack traffic.
引用
收藏
页码:71 / 86
页数:16
相关论文
共 50 条
  • [1] Honeycomb - Creating intrusion detection signatures using honeypots
    Kreibich, C
    Crowcroft, J
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (01) : 51 - 56
  • [2] Temporal signatures for intrusion detection
    Jones, A
    Li, S
    17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 252 - 261
  • [3] Modeling Modbus TCP for Intrusion Detection
    Faisal, Mustafa
    Cardenas, Alvaro A.
    Wool, Avishai
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 386 - 390
  • [4] Using model checking to identify errors in intrusion detection signatures
    Schmerl S.
    Vogel M.
    König H.
    International Journal on Software Tools for Technology Transfer, 2011, 13 (01) : 89 - 106
  • [5] Intrusion Detection Using Signatures Extracted from Execution Profiles
    El-Ghali, Marwa
    Masri, Wes
    2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR SECURE SYSTEMS, 2009, : 17 - 24
  • [6] Adaptable Intrusion Detection Using Partial Runtime Reconfiguration
    Rahmatian, Mehryar
    Kooti, Hessam
    Harris, Ian G.
    Bozorgzadeh, Elaheh
    2012 IEEE 30TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2012, : 147 - 152
  • [7] TCP/IP Model and Intrusion Detection Systems
    Zaman, Safaa
    Karray, Fakhri
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 90 - 96
  • [8] TCP/IP Feature Reduction in Intrusion Detection
    LIU Yuling
    Wuhan University Journal of Natural Sciences, 2007, (01) : 151 - 154
  • [9] Multipath TCP
    Paasch, Christoph
    Bonaventure, Olivier
    COMMUNICATIONS OF THE ACM, 2014, 57 (04) : 51 - 57
  • [10] An Intrusion Detection Framework for IoT Using Partial Domain Adaptation
    Fan, Yulin
    Li, Yang
    Cui, Huajun
    Yang, Huiran
    Zhang, Yan
    Wang, Weiping
    SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 36 - 50