Hybrid intrusion detection with weighted signature generation over anomalous Internet episodes

被引:81
|
作者
Hwang, Kai [1 ]
Cai, Min [1 ]
Chen, Ying [1 ]
Qin, Min [1 ]
机构
[1] Univ So Calif, USC Viterbi Sch Engn, Internet & Grid Comp Lab, Los Angeles, CA 90089 USA
基金
美国国家科学基金会;
关键词
network security; intrusion detection systems; anomaly detection; signature generation; SNORT and Bro systems; false alarms; Internet episodes; traffic data mining;
D O I
10.1109/TDSC.2007.9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system ( ADS) to detect novel unknown attacks. By mining anomalous traffic episodes from Internet connections, we build an ADS that detects anomalies beyond the capabilities of signature-based SNORT or Bro systems. A weighted signature generation scheme is developed to integrate ADS with SNORT by extracting signatures from anomalies detected. HIDS extracts signatures from the output of ADS and adds them into the SNORT signature database for fast and accurate intrusion detection. By testing our HIDS scheme over real-life Internet trace data mixed with 10 days of Massachusetts Institute of Technology/ Lincoln Laboratory (MIT/LL) attack data set, our experimental results show a 60 percent detection rate of the HIDS, compared with 30 percent and 22 percent in using the SNORT and Bro systems, respectively. This sharp increase in detection rate is obtained with less than 3 percent false alarms. The signatures generated by ADS upgrade the SNORT performance by 33 percent. The HIDS approach proves the vitality of detecting intrusions and anomalies, simultaneously, by automated data mining and signature generation over Internet connection episodes.
引用
收藏
页码:41 / 55
页数:15
相关论文
共 50 条
  • [1] Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks
    Kaur, Sanmeet
    Singh, Maninder
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (12): : 7859 - 7877
  • [2] Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks
    Sanmeet Kaur
    Maninder Singh
    Neural Computing and Applications, 2020, 32 : 7859 - 7877
  • [3] A SIGNATURE DATABASE FOR INTRUSION DETECTION SYSTEMS TARGETING VOICE OVER INTERNET PROTOCOL ENVIRONMENTS
    Barry, Bazara I. A.
    Chan, H. Anthony
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 986 - 993
  • [4] A Hybrid Intrusion Detection Architecture for Internet of Things
    Sheikhan, Mansour
    Bostani, Hamid
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 601 - 606
  • [5] Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection System
    Wang, Min-Feng
    Wu, Yen-Ching
    Tsai, Meng-Feng
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1246 - 1252
  • [6] Interpretable intrusion detection for next generation of Internet of Things
    Djenouri, Youcef
    Belhadi, Asma
    Srivastava, Gautam
    Lin, Jerry Chun-Wei
    Yazidi, Anis
    COMPUTER COMMUNICATIONS, 2023, 203 : 192 - 198
  • [7] Towards An Attack Signature Generation Framework for Intrusion Detection Systems
    Shahriar, Hossain
    Bond, William
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 597 - 603
  • [8] Hybrid Data Mining Approaches for Intrusion Detection in the Internet of Things
    Oreski, Dijana
    Androcec, Darko
    2018 INTERNATIONAL CONFERENCE ON SMART SYSTEMS AND TECHNOLOGIES (SST), 2018, : 221 - 226
  • [9] Anomalous payload-based worm detection and signature generation
    Wang, K
    Cretu, G
    Stolfo, SJ
    RECENT ADVANCES IN INTRUSION DETECTION, 2006, 3858 : 227 - 246
  • [10] A hierarchical hybrid intrusion detection model for industrial internet of things
    Wang, Zhendong
    Yang, Xin
    Zeng, Zhiyuan
    He, Daojing
    Chan, Sammy
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (05) : 3385 - 3407