MEASURING INCONSISTENCY IN A NETWORK INTRUSION DETECTION RULE SET BASED ON SNORT

被引:14
|
作者
Mcareavey, Kevin [1 ]
Liu, Weiru [2 ]
Miller, Paul [1 ]
Mu, Kedian [3 ]
机构
[1] Queens Univ Belfast, Ctr Secure Informat Technol, Inst Elect Commun & Informat Technol, Northern Ireland Sci Pk, Belfast BT3 9DT, Antrim, North Ireland
[2] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast BT7 1NN, Antrim, North Ireland
[3] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
基金
英国工程与自然科学研究理事会;
关键词
Network intrusion detection; inconsistency measures; Snort rules;
D O I
10.1142/S1793351X11001274
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this preliminary study, we investigate how inconsistency in a network intrusion detection rule set can be measured. To achieve this, we first examine the structure of these rules which are based on Snort and incorporate regular expression (Regex) pattern matching. We then identify primitive elements in these rules in order to translate the rules into their (equivalent) logical forms and to establish connections between them. Additional rules from background knowledge are also introduced to make the correlations among rules more explicit. We measure the degree of inconsistency in formulae of such a rule set (using the Scoring function, Shapley inconsistency values and Blame measure for prioritized knowledge) and compare the informativeness of these measures. Finally, we propose a new measure of inconsistency for prioritized knowledge which incorporates the normalized number of atoms in a language involved in inconsistency to provide a deeper inspection of inconsistent formulae. We conclude that such measures are useful for the network intrusion domain assuming that introducing expert knowledge for correlation of rules is feasible.
引用
收藏
页码:281 / 322
页数:42
相关论文
共 50 条
  • [1] Efficient Snort Rule Generation using Evolutionary computing for Network Intrusion Detection
    Muthuregunathan, Raghavan
    Siddharth, S.
    Srivathsan, R.
    Rajesh, S. R.
    [J]. 2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 336 - 341
  • [2] Rule generalisation in intrusion detection systems using SNORT
    Aickelin, Uwe
    Twycross, Jamie
    Hesketh-Roberts, Thomas
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) : 101 - 116
  • [3] Rule-Based Network Intrusion Detection System for Port Scanning with Efficient Port Scan Detection Rules Using Snort
    Patel, Satyendra Kumar
    Sonker, Abhilash
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (06): : 339 - 350
  • [4] A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence
    Liu, Tao
    Zhang, Da
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS, NETWORK AND COMPUTER ENGINEERING (ICENCE 2016), 2016, 67 : 769 - 775
  • [5] Snort Rule Detection for Countering in Network Attacks
    Somu, Venkateswarlu
    Kamesh, D. B. K.
    Sastry, J. K. R.
    Sitara, S. N. M.
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 573 - 583
  • [6] Campus Network Security Program Based on Snort Network Security Intrusion Detection System
    Ling, Jia
    [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 3235 - 3240
  • [7] Building intrusion pattern miner for Snort network intrusion detection system
    Wuu, Lih-Chyau
    Hung, Chi-Hsiang
    Chen, Sout-Fong
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (10) : 1699 - 1715
  • [8] Building intrusion pattern miner for snort network intrusion detection system
    Wuu, LC
    Chen, SF
    [J]. 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 477 - 484
  • [9] Improving Intrusion Detection System Based on Snort Rules for Network Probe Attack Detection
    Khamphakdee, Nattawat
    Benjamas, Nunnapus
    Saiyod, Saiyan
    [J]. 2014 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2014,
  • [10] Bayesian Classifier and Snort based Network Intrusion Detection System in Cloud Computing
    Modi, Chirag N.
    Patel, Dhiren R.
    Patel, Avi
    Muttukrishnan, Rajarajan
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,