Rule Generalisation using Snort U Aickelin , J Twycross and T Hesketh - Roberts

نویسندگان

  • U Aickelin
  • J Twycross
چکیده

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and SNORT is one popular and actively developing open-source IDS that uses such a set of signatures known as SNORT rules. Our aim is to identify a way in which SNORT could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current SNORT rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. Keyword: anomaly detection, intrusion detection, Snort, Snort rules Reference to this paper should be made as follows: Uwe Aickelin, Jamie Twycross and Thomas Hesketh-Roberts (xxxx) ‘Rule Generalisation in Intrusion Detection Systems using SNORT’, International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. x, No. x, pp.xxx–xxx. Biographical notes: Uwe Aickelin is a Reader and Advanced EPSRC Research Fellow in the School of Computer Science & IT at the University of Nottingham. His research interests are mathematical modelling, heuristic optimisation and artificial immune systems applied to computer security problems. Jamie Twycross is a Research Associate and is currently working on a large interdisciplinary project investigating the application of immune-inspired approaches to computer security. His research interests include biologically-inspired approaches to computing, computer security and networking, and robotics. Thomas Hesketh-Roberts is a student in Computer Science.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rule Generalisation in Intrusion Detection Systems using Snort

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and SNORT is one popular and actively developing open-so...

متن کامل

Aickelin, Uwe and Greensmith, Julie and Twycross, Jamie (2004) 'Immune System Approaches to Intrusion Detection - A Review'. In: ICARIS-2004, 3rd International Conference on Artificial Immune Systems, LNCS 3239, 2004, Catalania, Italy

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of co...

متن کامل

Articulation and Clarification of the Dendritic Cell Algorithm

The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer security. A port scan detection task is performed to substantiate the influence of signal selection on the behaviour of the algorithm. Experimenta...

متن کامل

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems

In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves ...

متن کامل

Towards a Conceptual Framework for Innate Immunity

Innate immunity now occupies a central role in immunology. However, artificial immune system models have largely been inspired by adaptive not innate immunity. This paper reviews the biological principles and properties of innate immunity and, adopting a conceptual framework, asks how these can be incorporated into artificial models. The aim is to outline a meta-framework for models of innate i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007