A Digest and Pattern Matching-Based Intrusion Detection Engine

被引:7
|
作者
Chen, Zhongqiang [1 ]
Zhang, Yuan [2 ]
Chen, Zhongrong [3 ]
Delis, Alex [4 ]
机构
[1] Yahoo Inc, Santa Clara, CA 95054 USA
[2] Florida State Univ, Dept Math, Tallahassee, FL 32306 USA
[3] ProMetrics Inc, King Of Prussia, PA 19406 USA
[4] Univ Athens, Dept Informat & Telecommun, Athens 15784, Greece
来源
COMPUTER JOURNAL | 2009年 / 52卷 / 06期
关键词
pattern matching engine of IDSs; IPSs; multi-pattern matching algorithms; fingerprinting and digesting techniques; intrusion detection process; AID;
D O I
10.1093/comjnl/bxp026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-world network traffic is largely legitimate and that telltales manifested by exploits rarely appear in network streams lead us to the proposal of Fingerprinter. This framework integrates fingerprinting and PM methods to rapidly distinguish well-behaved from malicious traffic. Fingerprinter produces concise digests or fingerprints for attack signatures during its programming phase. In its querying phase, the framework quickly identifies attack-free connections by transforming input traffic into its fingerprint space and matching its digest against those of attack signatures. If the legitimacy of a stream cannot be determined by fingerprints alone, our framework uses the <monospace>Boyer-Moore</monospace> algorithm to ascertain whether attack signatures appear in the stream. To reduce false matches, we resort to multiple fingerprinting techniques including Bloom-Filter and Rabin-Fingerprint. Experimentation with a prototype and a variety of traces has helped us establish that Fingerprinter significantly accelerates the attack detection process.
引用
收藏
页码:699 / 723
页数:25
相关论文
共 50 条
  • [31] FPGA-Based Parallel Pattern Matching Algorithm for Network Intrusion Detection System
    Yu, Jing
    Yang, Bo
    Sun, Ruiyuan
    Chen, Zhenxiang
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 458 - 461
  • [32] A fast pattern matching algorithm for network processor-based intrusion detection system
    Liu, RT
    Huang, NF
    Kao, CN
    Chen, CH
    [J]. CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 271 - 275
  • [33] Research on Efficient Pattern Matching Algorithms in Intrusion Detection System
    Liu-xiaoxing
    Yu-ning
    [J]. 2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA), 2014, : 509 - 512
  • [34] A Fast and Configurable Pattern Matching Hardware Architecture for Intrusion Detection
    Liu, Yizhen
    Xu, Daxiong
    Liu, Dong
    Sun, Lingge
    [J]. WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 614 - +
  • [35] Algorithms to speedup pattern matching for network intrusion detection systems
    Zheng, Kai
    Cai, Zhiping
    Zhang, Xin
    Wang, Zhijun
    Yang, Baohua
    [J]. COMPUTER COMMUNICATIONS, 2015, 62 : 47 - 58
  • [36] Efficient hardware support for pattern matching in network intrusion detection
    Guinde, Nitesh B.
    Ziavras, Sotirios G.
    [J]. COMPUTERS & SECURITY, 2010, 29 (07) : 756 - 769
  • [37] Fast and scalable pattern matching for network intrusion detection systems
    Dharmapurikar, Sarang
    Lockwood, John W.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (10) : 1781 - 1792
  • [38] Pattern Matching Intrusion Detection Technique for Wireless Sensor Networks
    Kalnoor, Gauri
    Agarkhed, Jayashree
    [J]. PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 724 - 728
  • [39] Distributed Hierarchical Pattern-Matching for Network Intrusion Detection
    Baig, Zubair
    Salah, Khaled
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 167 - 178
  • [40] High-performance pattern-matching for intrusion detection
    van Lunteren, Jan
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 1409 - 1421