Enhancing network intrusion detection with integrated sampling and filtering

被引:0
|
作者
Gonzalez, Jose M. [1 ]
Paxson, Vern [1 ]
机构
[1] Int Comp Sci Inst, Berkeley, CA 94704 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The structure of many standalone network intrusion detection systems (NIDSs) centers around a chain of analysis that begins with packets captured by a packet filter, where the filter describes the protocols (TCP/UDP port numbers) and sometimes hosts or subnets to include or exclude from the analysis. In this work we argue for augmenting such analysis with an additional, separately filtered stream of packets. This "Secondary Path" supplements the "Main Path" by integrating sampling and richer forms of filtering into a NIDS's analysis. We discuss an implementation of a secondary path for the Bro intrusion detection system and enhancements we developed to the Berkeley Packet Filter to work in concert with the secondary path. Such an additional packet stream provides benefits in terms of both efficiency and ease of expression, which we illustrate by applying it to three forms of NIDS analysis: tracking very large individual connections, finding "heavy hitter" traffic streams, and implementing backdoor detectors (developed in previous work) with particular ease.
引用
收藏
页码:272 / 289
页数:18
相关论文
共 50 条
  • [41] Integrated intrusion detection in databases
    Fonseca, Jose
    Vieira, Marco
    Madeira, Henrique
    DEPENDABLE COMPUTING, PROCEEDINGS, 2007, 4746 : 198 - +
  • [42] Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data
    Meng, Weizhi
    Li, Wenjuan
    Su, Chunhua
    Zhou, Jianying
    Lu, Rongxing
    IEEE ACCESS, 2018, 6 : 7234 - 7243
  • [43] Intrusion Detection for Enhancing RPL Security
    Gothawal, Deepali Bankatsingh
    Nagaraj, S. V.
    2ND INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING ICRTAC -DISRUP - TIV INNOVATION , 2019, 2019, 165 : 565 - 572
  • [44] Enhancing network security: an intrusion detection system using residual network-based convolutional neural network
    Farhan, Saima
    Mubashir, Jovaria
    Haq, Yasin Ul
    Mahmood, Tariq
    Rehman, Amjad
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (04):
  • [45] Wireless Intrusion Detection: Not as easy as traditional network intrusion detection
    Tao, Zhiqi
    Ruighaver, A. B.
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 2513 - +
  • [46] Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection
    Biyyapu, Narasimhaswamy
    Veerapaneni, Esther Jyothi
    Surapaneni, Phani Praveen
    Vellela, Sai Srinivas
    Vatambeti, Ramesh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5913 - 5931
  • [47] SMOTE-NCL: A Re-sampling Method with Filter for Network Intrusion Detection
    Sun, Yong
    Liu, Feng
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1157 - 1161
  • [48] An integrated system of intrusion detection based on rough set and wavelet neural network
    Yu, Ling
    Chen, Bo
    Xiao, Jumno
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 194 - +
  • [49] An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network
    Sun, Xuemei
    Yan, Bo
    Zhang, Xinzhong
    Rong, Chuitian
    PLOS ONE, 2015, 10 (10):
  • [50] Automatic backdoor analysis with a network intrusion detection system and an integrated service checker
    Juslin, J
    Virtanen, T
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 122 - 126