Intrusion Detection: Forensic Computing Insights arising from a Case Study on SNORT

نویسندگان

  • Vlasti Broucek
  • Paul Turner
  • Urs E. Gattiker
چکیده

As the dangers of hacking and cyber-warfare for network security become a reality, the need to be able to generate legally admissible evidence of criminal or other illegal on-line behaviours has become increasingly important. While technical systems providing intrusion detection and network monitoring are constantly being improved, the security they provide is never absolute. As a result, when assessing the value and nature of the data these systems produce, it becomes critical to be aware of a number of factors: these systems themselves are susceptible to attack and/or evasion (Arona, Bruschi, & Rosti, 1999; Handley, Paxson, & Kreibich, 2001; Ptacek & Newsham, 1998); these systems may only collect a partial data set; and, these data sets may themselves be flawed, erroneous or already have been tampered with (Broucek & Turner, 2002b). Additionally, the issue of privacy and data protection is emerging as a central debate in forensic computing research (Broucek & Turner, 2002b). In this context, this paper provides a detailed case study on the use of the SNORT intrusion detection system (IDS) on a university department World Wide Web (WWW) server. The case study is analysed and discussed using a forensic computing perspective. This perspective considers the nature of the intrusion detection and network monitoring security provided and evaluates the system in terms of its evidence acquisition (“forensic”) capabilities, the legal admissibility of the digital evidence generated and privacy implications of intrusion detection systems and network monitoring.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improvement and parallelization of Snort network intrusion detection mechanism using graphics processing unit

Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...

متن کامل

Extracting Forensic Explanation from Intrusion Alerts

Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a “lazy trigger.” In other words, it reports only a partial list of multiple rules matching the attack signature pattern(s). In this research, we assert that the ability of inferring the hidden matching rules from the observed rule...

متن کامل

Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS

The objective of this research is to show an analytical intrusion detection framework (AIDF) comprised of (i) a probability model discovery approach, and (ii) a probabilistic inference mechanism for generating the most probable forensic explanation based on not only just the observed intrusion detection alerts, but also the unreported signature rules that are revealed in the probability model. ...

متن کامل

New Use Cases for Snort: Cloud and Mobile Environments

First, this case study explores an Intrusion Detection System package called Snort (provided by Cisco Systems) in a cloud environment. Snort is an open source and highly scalable signaturebased intrusion detection system. Here, Snort is deployed on Ubuntu Server 16.0.4 running on a virtual machine within a Microsoft Azure cloud system. This paper provides details on installing Snort on the virt...

متن کامل

Wireless Snort - A WIDS in progress

The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, software patches to enable 802.11 wireless intrusion detection capability in Snort have been released. This paper focuses on the lessons learned from a live deployment of these wireless extensions to the Snort IDS. Gener...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003