Using Partial Signatures in Intrusion Detection for Multipath TCP

被引:1
|
作者
Afzal, Zeeshan [1 ]
Garcia, Johan [1 ]
Lindskog, Stefan [1 ]
Brunstrom, Anna [1 ]
机构
[1] Karlstad Univ, Karlstad, Sweden
来源
关键词
D O I
10.1007/978-3-030-35055-0_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional security mechanisms such as signature based intrusion detection systems (IDSs) attempt to find a perfect match of a set of signatures in network traffic. Such IDSs depend on the availability of a complete application data stream. With emerging protocols such as Multipath TCP (MPTCP), this precondition cannot be ensured, resulting in false negatives and IDS evasion. On the other hand, if approximate signature matching is used instead in an IDS, a potentially high number of false positives make the detection impractical. In this paper, we show that, by using a specially tailored partial signature matcher and knowledge about MPTCP semantics, the Snort3 IDS can be empowered with partial signature detection. Additionally, we uncover the type of Snort3 rules suitable for the task of partial matching. Experimental results with these rules show a low false positive rate for benign traffic and high detection coverage for attack traffic.
引用
收藏
页码:71 / 86
页数:16
相关论文
共 50 条
  • [21] Experimenting with Multipath TCP
    Barre, Sebastien
    Bonaventure, Olivier
    Raiciu, Costin
    Handley, Mark
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (04) : 443 - 444
  • [22] Securing MultiPath TCP
    Jadin, Mathieu
    Tihon, Gautier
    17TH IEEE INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES - IEEE EUROCON 2017 CONFERENCE PROCEEDINGS, 2017, : 954 - 959
  • [23] Experimenting with Multipath TCP
    Barre, Sebastien
    Bonaventure, Olivier
    Raiciu, Costin
    Handley, Mark
    TOWARDS A SERVICE-BASED INTERNET, 2010, 6481 : 193 - +
  • [24] HTTP Data Offloading Using Multipath TCP Proxy
    Pollalis, Christos
    Charalampou, Paris
    Sykas, Efstathios
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 777 - 782
  • [25] On the Benefits of Using Multipath TCP and Openflow in Shared Bottlenecks
    Sandri, Marcus
    Silva, Alan
    Rocha, Lucio A.
    Verdi, Fabio L.
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 9 - 16
  • [26] Intrusion Detection System Using Bagging with Partial Decision TreeBase Classifier
    Gaikwad, D. P.
    Thool, Ravindra C.
    PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15), 2015, 49 : 92 - 98
  • [27] ReMP TCP: Low Latency Multipath TCP
    Froemmgen, Alexander
    Erbshaeusser, Tobias
    Buchmann, Alejandro
    Zimmermann, Torsten
    Wehrle, Klaus
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, : 783 - 789
  • [28] Optimal Multipath Planning for intrusion detection in smart homes using Wireless Sensor and Actor Networks
    Lai, Yung-Liang
    Jiang, Jehn-Ruey
    Proceedings of the International Conference on Parallel Processing Workshops, 2010, : 562 - 570
  • [29] A simple multipath OpenFlow controller using topology-based algorithm for multipath TCP
    Nakasan, Chawanat
    Ichikawa, Kohei
    Iida, Hajimu
    Uthayopas, Putchong
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (13):
  • [30] TCP/IP Reassembly in Network Intrusion Detection and Prevention Systems
    Wang, Xiaojun
    Cronin, Brendan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (03) : 63 - 76