MEASURING INCONSISTENCY IN A NETWORK INTRUSION DETECTION RULE SET BASED ON SNORT

被引:14
|
作者
Mcareavey, Kevin [1 ]
Liu, Weiru [2 ]
Miller, Paul [1 ]
Mu, Kedian [3 ]
机构
[1] Queens Univ Belfast, Ctr Secure Informat Technol, Inst Elect Commun & Informat Technol, Northern Ireland Sci Pk, Belfast BT3 9DT, Antrim, North Ireland
[2] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast BT7 1NN, Antrim, North Ireland
[3] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
基金
英国工程与自然科学研究理事会;
关键词
Network intrusion detection; inconsistency measures; Snort rules;
D O I
10.1142/S1793351X11001274
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this preliminary study, we investigate how inconsistency in a network intrusion detection rule set can be measured. To achieve this, we first examine the structure of these rules which are based on Snort and incorporate regular expression (Regex) pattern matching. We then identify primitive elements in these rules in order to translate the rules into their (equivalent) logical forms and to establish connections between them. Additional rules from background knowledge are also introduced to make the correlations among rules more explicit. We measure the degree of inconsistency in formulae of such a rule set (using the Scoring function, Shapley inconsistency values and Blame measure for prioritized knowledge) and compare the informativeness of these measures. Finally, we propose a new measure of inconsistency for prioritized knowledge which incorporates the normalized number of atoms in a language involved in inconsistency to provide a deeper inspection of inconsistent formulae. We conclude that such measures are useful for the network intrusion domain assuming that introducing expert knowledge for correlation of rules is feasible.
引用
收藏
页码:281 / 322
页数:42
相关论文
共 50 条
  • [21] Incremental SVM based on reserved set for network intrusion detection
    Yi, Yang
    Wu, Jiansheng
    Xu, Wei
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (06) : 7698 - 7707
  • [22] Framework of Intrusion Detection System via Snort Application on Campus Network Environment
    Ismail, Mohd Nazri
    Ismail, Mohd Taha
    INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATIONS, PROCEEDINGS, 2009, : 455 - 459
  • [23] A PSO-Based approach to rule learning in network intrusion detection
    Chen, Guolong
    Chen, Qingliang
    Guo, Wenzhong
    FUZZY INFORMATION AND ENGINEERING, PROCEEDINGS, 2007, 40 : 666 - +
  • [24] Predictive Rule Discovery for Network Intrusion Detection
    Patel, Kanubhai
    Buddhadev, Bharat
    INTELLIGENT DISTRIBUTED COMPUTING, 2015, 321 : 287 - 298
  • [25] A Cooperative and Hybrid Network Intrusion Detection Framework in Cloud Computing Based on Snort and Optimized Back Propagation Neural Network
    Chiba, Z.
    Abghour, N.
    Moussaid, K.
    El Omri, A.
    Rida, M.
    7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 1200 - 1206
  • [26] Fuzzy Inference Based Intrusion Detection System: FI-Snort
    Naik, Nitin
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 2066 - 2071
  • [27] On the fly pattern matching for intrusion detection with Snort
    Abbes, T
    Bouhoula, A
    Rusinowitch, M
    ANNALS OF TELECOMMUNICATIONS, 2004, 59 (9-10) : 1045 - 1071
  • [28] Investigation of the Intrusion Detection System "Snort" Performance
    Paulauskas, N.
    Skudutis, J.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2008, (07) : 15 - 18
  • [29] A SNORT-BASED MOBILE AGENT FOR A DISTRIBUTED INTRUSION DETECTION SYSTEM
    Brahmil, Imen
    Ben Yahial, Sadok
    Poncelet, Pascal
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 198 - 207
  • [30] Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN
    Ujjan, Raja Majid Ali
    Pervez, Zeeshan
    Dahal, Keshav
    2019 13TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA), 2019,