MEASURING INCONSISTENCY IN A NETWORK INTRUSION DETECTION RULE SET BASED ON SNORT

被引:14
|
作者
Mcareavey, Kevin [1 ]
Liu, Weiru [2 ]
Miller, Paul [1 ]
Mu, Kedian [3 ]
机构
[1] Queens Univ Belfast, Ctr Secure Informat Technol, Inst Elect Commun & Informat Technol, Northern Ireland Sci Pk, Belfast BT3 9DT, Antrim, North Ireland
[2] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast BT7 1NN, Antrim, North Ireland
[3] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
基金
英国工程与自然科学研究理事会;
关键词
Network intrusion detection; inconsistency measures; Snort rules;
D O I
10.1142/S1793351X11001274
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this preliminary study, we investigate how inconsistency in a network intrusion detection rule set can be measured. To achieve this, we first examine the structure of these rules which are based on Snort and incorporate regular expression (Regex) pattern matching. We then identify primitive elements in these rules in order to translate the rules into their (equivalent) logical forms and to establish connections between them. Additional rules from background knowledge are also introduced to make the correlations among rules more explicit. We measure the degree of inconsistency in formulae of such a rule set (using the Scoring function, Shapley inconsistency values and Blame measure for prioritized knowledge) and compare the informativeness of these measures. Finally, we propose a new measure of inconsistency for prioritized knowledge which incorporates the normalized number of atoms in a language involved in inconsistency to provide a deeper inspection of inconsistent formulae. We conclude that such measures are useful for the network intrusion domain assuming that introducing expert knowledge for correlation of rules is feasible.
引用
收藏
页码:281 / 322
页数:42
相关论文
共 50 条
  • [31] Rough Set Theory based Hybrid Method for Network Intrusion Detection
    Jiao, Na
    MECHATRONICS, ROBOTICS AND AUTOMATION, PTS 1-3, 2013, 373-375 : 815 - 818
  • [32] Network Intrusion Detection Based On Cluster Analysis And Multiple Core Set
    Gao Ruimei
    Chen Shuyu
    PROCEEDINGS OF THE 2015 INTERNATIONAL INDUSTRIAL INFORMATICS AND COMPUTER ENGINEERING CONFERENCE, 2015, : 36 - 39
  • [33] Network connection based intrusion detection using rough set classification
    Zhang, Hongmei
    Wang, Xingyu
    Wang, Yong
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 2128 - +
  • [34] Research of Distributed Network Intrusion Detection System Based on Rough Set
    Zhong Zufeng
    PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 200 - 202
  • [35] RESEARCH AND IMPLEMENTATION ON SNORT-BASED HYBRID INTRUSION DETECTION SYSTEM
    Ding, Yu-Xin
    Xiao, Min
    Liu, Ai-Wu
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 1414 - 1418
  • [36] Method on Rule Extracting in Misuse Intrusion Detection Based on Rough Set Genetic Algorithm
    Qin Aiming
    Shao Li
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 731 - 734
  • [37] REAL-TIME TRAFFIC DETECTION and ANALYSIS of NETWORK SECURITY INTRUSION ATTACK: SNORT INTRUSION PREVENTION SYSTEM
    Zhou A.L.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2020, 79 (12): : 1055 - 1062
  • [38] Association Rule Mining Frequent-Pattern-Based Intrusion Detection in Network
    Sivanantham, S.
    Mohanraj, V
    Suresh, Y.
    Senthilkumar, J.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (02): : 1617 - 1631
  • [39] Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System
    Fries, Terrence P.
    WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 172 - 177
  • [40] Ontology-Based Layered Rule-Based Network Intrusion Detection System for Cybercrimes Detection
    Ayo, Femi Emmanuel
    Awotunde, Joseph Bamidele
    Ogundele, Lukman Adebayo
    Solanke, Olakunle Olugbenga
    Brahma, Biswajit
    Panigrahi, Ranjit
    Bhoi, Akash Kumar
    KNOWLEDGE AND INFORMATION SYSTEMS, 2024, 66 (06) : 3355 - 3392