Dynamic application-layer protocol analysis for network intrusion detection

被引:0
|
作者
Dreger, Holger [1 ]
Feldmann, Anja
Mai, Michael
Paxson, Vern
Sommer, Robin
机构
[1] Tech Univ Munich, D-8000 Munich, Germany
[2] Univ Calif Berkeley, Lawrence Berkeley Lab, Int Comp Sci Inst, Berkeley, CA 94720 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many network intrusion detection systems (NIDS) rely on protocol-specific analyzers to extract the higher-level semantic context from a traffic stream. To select the correct kind of analysis, traditional systems exclusively depend on well-known port numbers. However, based on our experience, increasingly significant portions of today's traffic are not classifiable by such a scheme. Yet for a NIDS, this traffic is very interesting, as a primary reason for not using a standard port is to evade security and policy enforcement monitoring. In this paper, we discuss the design and implementation of a NIDS extension to perform dynamic application-layer protocol analysis. For each connection, the system first identifies potential protocols in use and then activates appropriate analyzers to verify the decision and extract higher-level semantics. We demonstrate the power of our enhancement with three examples: reliable detection of applications not using their standard ports, payload inspection of FTP data transfers, and detection of IRC-based botnet clients and servers. Prototypes of our system currently run at the border of three large-scale operational networks. Due to its success, the bot-detection is already integrated into a dynamic inline blocking of production traffic at one of the sites.
引用
收藏
页码:257 / 272
页数:16
相关论文
共 50 条
  • [1] Application-Layer Intrusion Detection in MANETs
    Chang, Katharine
    Shin, Kang G.
    [J]. 43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 2800 - 2809
  • [2] Application-Layer DDoS Attack Detection Using Explicit Duration Recurrent Network-Based Application-Layer Protocol Communication Models
    Xie, Bailin
    Wang, Yu
    Wen, Guogui
    Xu, Xiaojun
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2023, 2023
  • [3] Application-layer Anomaly Detection Based on Application-layer Protocols' Keywords
    Xie, Bailin
    Zhang, Qiansheng
    [J]. PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 2131 - 2135
  • [4] A lightweight application-layer signaling protocol
    Kitamura, Tsutomu
    Shizuno, Takayuki
    Okabe, Toshiya
    Tani, Hideaki
    [J]. 2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 448 - 452
  • [5] Implementation of application layer Intrusion Detection System using protocol analysis
    Sangeetha, S.
    Vaidehi, V.
    Srinivasan, N.
    Rajkumar, K. V.
    Pradeep, S.
    Ragavan, N.
    Lokesh, C. Sri Sai
    Subadeepak, I.
    Prashanth, V.
    [J]. ICSCN 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING COMMUNICATIONS AND NETWORKING, 2008, : 279 - 284
  • [6] IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering
    Luo, Jian-Zhen
    Shan, Chun
    Cai, Jun
    Liu, Yan
    [J]. SYMMETRY-BASEL, 2018, 10 (11):
  • [7] SAMP: Scalable application-layer mobility protocol
    Pack, S
    Park, K
    Kwon, T
    Choi, Y
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2006, 44 (06) : 86 - 92
  • [8] Application-Layer Protocol for Collaborative Multimedia Presentations
    Eenjun Hwang
    B. Prabhakaran
    [J]. Multimedia Tools and Applications, 2003, 21 : 103 - 123
  • [9] An approach to application-layer DoS detection
    Kemp, Cliff
    Calvert, Chad
    Khoshgoftaar, Taghi M.
    Leevy, Joffrey L.
    [J]. JOURNAL OF BIG DATA, 2023, 10 (01)
  • [10] An application-layer multicasting protocol for distributed collaboration
    Shirmohammadi, S
    Diabi, A
    Lacombe, P
    [J]. 2005 IEEE International Workshop on Haptic Audio Visual Environments and their Applications, 2005, : 139 - 142