Dynamic two-layer signature-based IDS with unequal databases

被引:0
|
作者
Salour, Mehdi [1 ]
Su, Xiao [1 ]
机构
[1] San Jose State Univ, Dept Comp Engn, San Jose, CA 95192 USA
关键词
internet security; worm; signature-based; IDS; performance;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Signature-based detection is the most widely used technique for Intrusion Detection Systems (IDS). One of the major challenges for signature-based IDS is how to keep up with a large volume of incoming traffic when each packet needs to be compared with every signature in the database. When an IDS cannot keep up with the traffic flood, all it can do is to drop packets, therefore, may miss potential attacks. In this paper, we propose a dynamic model of two-layer signature-based IDS with unequal database, which can detect imminent threats with very high success rate by automatically creating and using a small efficient database, and at the same time, provide mechanisms to detect all other known threats by using a less efficient complementary database.
引用
收藏
页码:77 / +
页数:3
相关论文
共 50 条
  • [1] Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic
    Tahmi, Omar
    Talhi, Chamseddine
    Challal, Yacine
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 : 423 - 440
  • [2] On the sufficiency of time-based correlation for signature-based IDS alerts
    Neville, SW
    [J]. 2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 836 - 839
  • [3] False alarm reduction in signature-based IDS: game theory approach
    Subba, Basant
    Biswas, Santosh
    Karmakar, Sushanta
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 4863 - 4881
  • [4] Countermeasure of Attack Vectors using Signature-Based IDS in IoT Environments
    Sheikh, Taj Uddin
    Rahman, Hasina
    Al-Qahtani, Hamed Saleh
    Hazra, Tapan Kumar
    Sheikh, Nazim Uddin
    [J]. 2019 IEEE 10TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2019, : 1130 - 1136
  • [5] The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems
    Einy, Sajad
    Oz, Cemil
    Navaei, Yahya Dorostkar
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [6] Pattern matching of signature-based ids using myers algorithm under mapreduce framework
    Aldwairi M.
    Abu-Dalo A.M.
    Jarrah M.
    [J]. EURASIP Journal on Information Security, 2017 (1)
  • [7] A signature-based approach for diagnosis of dynamic faults in SRAMs
    Ney, A.
    Bosio, A.
    Dilillo, L.
    Girard, P.
    Pravossoudovitch, S.
    Virazel, A.
    [J]. 2008 INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE, 2008, : 229 - 234
  • [8] Signature-Based Intrusion Detection System (IDS) for In-Vehicle CAN Bus Network
    Jin, Shiyi
    Chung, Jin-Gyun
    Xu, Yinan
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [9] Dynamic Signature-based Alignment Factor for Var Allocation
    Alshareef, Abdulrhman
    Shah, Rakibuzzaman
    Mithulananthan, N.
    Akram, Umer
    Krimanto, Awan Uji
    [J]. 2022 IEEE PES 14TH ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE, APPEEC, 2022,
  • [10] Collaborative IDS Configuration: A Two-layer Game-Theoretical Approach
    Jin, Richeng
    He, Xiaofan
    Dai, Huaiyu
    [J]. 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,