A Digest and Pattern Matching-Based Intrusion Detection Engine

被引:7
|
作者
Chen, Zhongqiang [1 ]
Zhang, Yuan [2 ]
Chen, Zhongrong [3 ]
Delis, Alex [4 ]
机构
[1] Yahoo Inc, Santa Clara, CA 95054 USA
[2] Florida State Univ, Dept Math, Tallahassee, FL 32306 USA
[3] ProMetrics Inc, King Of Prussia, PA 19406 USA
[4] Univ Athens, Dept Informat & Telecommun, Athens 15784, Greece
来源
COMPUTER JOURNAL | 2009年 / 52卷 / 06期
关键词
pattern matching engine of IDSs; IPSs; multi-pattern matching algorithms; fingerprinting and digesting techniques; intrusion detection process; AID;
D O I
10.1093/comjnl/bxp026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-world network traffic is largely legitimate and that telltales manifested by exploits rarely appear in network streams lead us to the proposal of Fingerprinter. This framework integrates fingerprinting and PM methods to rapidly distinguish well-behaved from malicious traffic. Fingerprinter produces concise digests or fingerprints for attack signatures during its programming phase. In its querying phase, the framework quickly identifies attack-free connections by transforming input traffic into its fingerprint space and matching its digest against those of attack signatures. If the legitimacy of a stream cannot be determined by fingerprints alone, our framework uses the <monospace>Boyer-Moore</monospace> algorithm to ascertain whether attack signatures appear in the stream. To reduce false matches, we resort to multiple fingerprinting techniques including Bloom-Filter and Rabin-Fingerprint. Experimentation with a prototype and a variety of traces has helped us establish that Fingerprinter significantly accelerates the attack detection process.
引用
收藏
页码:699 / 723
页数:25
相关论文
共 50 条
  • [1] A pattern matching based network intrusion detection system
    Zhou Chunyue
    Liu Yun
    Zhang Hongke
    [J]. 2006 9TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1- 5, 2006, : 1410 - +
  • [2] Research of pattern matching in intrusion detection
    Huang, JC
    Tian, JF
    Du, RZ
    Zhai, JQ
    [J]. 2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 1877 - 1882
  • [3] A Systolic Regular Expression Pattern Matching Engine and its Application to Network Intrusion Detection
    Kawanaka, Yosuke
    Wakabayashi, Shin'ichi
    Nagayama, Shinobu
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY, 2008, : 297 - 300
  • [4] On the fly pattern matching for intrusion detection with Snort
    Abbes, T
    Bouhoula, A
    Rusinowitch, M
    [J]. ANNALS OF TELECOMMUNICATIONS, 2004, 59 (9-10) : 1045 - 1071
  • [5] Robust and Fast Pattern Matching for Intrusion Detection
    Namjoshi, Kedar
    Narlikar, Girija
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [6] IMPROVEMENT OF ALGORITHM FOR PATTERN MATCHING IN INTRUSION DETECTION
    Zhao, Dongcan
    Zhu, Xiaomin
    Xu, Tong
    [J]. 2013 5TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY (IC-BNMT), 2013, : 281 - 284
  • [7] An Effective Pattern Matching Algorithm for Intrusion Detection
    Zhang, Qing-Qing
    Zhang, Qian
    Feng, Yue-jiang
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 3010 - +
  • [8] Hybrid pattern matching for trusted intrusion detection
    Soewito, Benfano
    Vespa, Lucas
    Weng, Ning
    Wang, Haibo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 33 - 43
  • [9] The improving pattern matching algorithm of intrusion detection
    Qu, Zhaoyang
    Huang, Xiaobo
    [J]. CEIS 2011, 2011, 15
  • [10] Improved Algorithm of pattern matching for Intrusion Detection
    Liu Zhen
    Xu Su
    Zhang Jue
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 446 - 449