Efficient Snort Rule Generation using Evolutionary computing for Network Intrusion Detection

被引:4
|
作者
Muthuregunathan, Raghavan [1 ]
Siddharth, S. [1 ]
Srivathsan, R. [1 ]
Rajesh, S. R. [1 ]
机构
[1] Anna Univ, Madras Inst Technol, Madras 600025, Tamil Nadu, India
关键词
Network Intrusion Detection; Clustering; Genetic Algorithm; Hill Climbing; parallel Computing; Snort; Grid;
D O I
10.1109/CICSYN.2009.19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network Intrusion Detection (NIDS) tool has become an important tool in detecting malicious activities in a network. Snort is a free and open source Network Intrusion Detection and prevention tool which is basically a rule driven system. Hence rule development for such NIDS tools becomes a sensitive task. Clustering techniques had been widely used to cluster the network traffic and to derive rule sets based on the resultant clusters. We propose a parallel Clustering technique followed by usage of evolutionary computing comprising of Genetic Algorithm and Hill climbing to optimize the clusters formed. Rules are generated by analyzing each individual clusters formed The proposed system was specifically developed with a view to generate rule set for Snort based IDS efficiently. The results show that careful selection of fitness function could improve the efficiency of rule set generated The computing power offered by Grid is used to accomplish the parallel computing task. Parallel Computation requires Cluster based resources which are offered by Grid.
引用
收藏
页码:336 / 341
页数:6
相关论文
共 50 条
  • [1] Rule generalisation in intrusion detection systems using SNORT
    Aickelin, Uwe
    Twycross, Jamie
    Hesketh-Roberts, Thomas
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) : 101 - 116
  • [2] Rule-Based Network Intrusion Detection System for Port Scanning with Efficient Port Scan Detection Rules Using Snort
    Patel, Satyendra Kumar
    Sonker, Abhilash
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (06): : 339 - 350
  • [3] MEASURING INCONSISTENCY IN A NETWORK INTRUSION DETECTION RULE SET BASED ON SNORT
    Mcareavey, Kevin
    Liu, Weiru
    Miller, Paul
    Mu, Kedian
    INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2011, 5 (03) : 281 - 322
  • [4] Bayesian Classifier and Snort based Network Intrusion Detection System in Cloud Computing
    Modi, Chirag N.
    Patel, Dhiren R.
    Patel, Avi
    Muttukrishnan, Rajarajan
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [5] Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System
    Fries, Terrence P.
    WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 172 - 177
  • [6] Intrusion Detection System with Snort in Cloud Computing: Advanced IDS
    Mishra, Vikas
    Vijay, Vinay Kumar
    Tazi, Satyanaryan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 457 - 465
  • [7] Detection of Intrusion Using Evolutionary Soft Computing Techniques
    Arya, Akansha
    Yadav, Aruna
    Kumar, Sanjeev
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 691 - 696
  • [8] Snort Rule Detection for Countering in Network Attacks
    Somu, Venkateswarlu
    Kamesh, D. B. K.
    Sastry, J. K. R.
    Sitara, S. N. M.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 573 - 583
  • [9] Building intrusion pattern miner for Snort network intrusion detection system
    Wuu, Lih-Chyau
    Hung, Chi-Hsiang
    Chen, Sout-Fong
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (10) : 1699 - 1715
  • [10] Building intrusion pattern miner for snort network intrusion detection system
    Wuu, LC
    Chen, SF
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 477 - 484