Intrusion Detection: Forensic Computing Insights arising from a Case Study on SNORT
نویسندگان
چکیده
As the dangers of hacking and cyber-warfare for network security become a reality, the need to be able to generate legally admissible evidence of criminal or other illegal on-line behaviours has become increasingly important. While technical systems providing intrusion detection and network monitoring are constantly being improved, the security they provide is never absolute. As a result, when assessing the value and nature of the data these systems produce, it becomes critical to be aware of a number of factors: these systems themselves are susceptible to attack and/or evasion (Arona, Bruschi, & Rosti, 1999; Handley, Paxson, & Kreibich, 2001; Ptacek & Newsham, 1998); these systems may only collect a partial data set; and, these data sets may themselves be flawed, erroneous or already have been tampered with (Broucek & Turner, 2002b). Additionally, the issue of privacy and data protection is emerging as a central debate in forensic computing research (Broucek & Turner, 2002b). In this context, this paper provides a detailed case study on the use of the SNORT intrusion detection system (IDS) on a university department World Wide Web (WWW) server. The case study is analysed and discussed using a forensic computing perspective. This perspective considers the nature of the intrusion detection and network monitoring security provided and evaluates the system in terms of its evidence acquisition (“forensic”) capabilities, the legal admissibility of the digital evidence generated and privacy implications of intrusion detection systems and network monitoring.
منابع مشابه
Improvement and parallelization of Snort network intrusion detection mechanism using graphics processing unit
Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...
متن کاملExtracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a “lazy trigger.” In other words, it reports only a partial list of multiple rules matching the attack signature pattern(s). In this research, we assert that the ability of inferring the hidden matching rules from the observed rule...
متن کاملIntegrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS
The objective of this research is to show an analytical intrusion detection framework (AIDF) comprised of (i) a probability model discovery approach, and (ii) a probabilistic inference mechanism for generating the most probable forensic explanation based on not only just the observed intrusion detection alerts, but also the unreported signature rules that are revealed in the probability model. ...
متن کاملNew Use Cases for Snort: Cloud and Mobile Environments
First, this case study explores an Intrusion Detection System package called Snort (provided by Cisco Systems) in a cloud environment. Snort is an open source and highly scalable signaturebased intrusion detection system. Here, Snort is deployed on Ubuntu Server 16.0.4 running on a virtual machine within a Microsoft Azure cloud system. This paper provides details on installing Snort on the virt...
متن کاملWireless Snort - A WIDS in progress
The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, software patches to enable 802.11 wireless intrusion detection capability in Snort have been released. This paper focuses on the lessons learned from a live deployment of these wireless extensions to the Snort IDS. Gener...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003