MEASURING INCONSISTENCY IN A NETWORK INTRUSION DETECTION RULE SET BASED ON SNORT

被引:14
|
作者
Mcareavey, Kevin [1 ]
Liu, Weiru [2 ]
Miller, Paul [1 ]
Mu, Kedian [3 ]
机构
[1] Queens Univ Belfast, Ctr Secure Informat Technol, Inst Elect Commun & Informat Technol, Northern Ireland Sci Pk, Belfast BT3 9DT, Antrim, North Ireland
[2] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast BT7 1NN, Antrim, North Ireland
[3] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
基金
英国工程与自然科学研究理事会;
关键词
Network intrusion detection; inconsistency measures; Snort rules;
D O I
10.1142/S1793351X11001274
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this preliminary study, we investigate how inconsistency in a network intrusion detection rule set can be measured. To achieve this, we first examine the structure of these rules which are based on Snort and incorporate regular expression (Regex) pattern matching. We then identify primitive elements in these rules in order to translate the rules into their (equivalent) logical forms and to establish connections between them. Additional rules from background knowledge are also introduced to make the correlations among rules more explicit. We measure the degree of inconsistency in formulae of such a rule set (using the Scoring function, Shapley inconsistency values and Blame measure for prioritized knowledge) and compare the informativeness of these measures. Finally, we propose a new measure of inconsistency for prioritized knowledge which incorporates the normalized number of atoms in a language involved in inconsistency to provide a deeper inspection of inconsistent formulae. We conclude that such measures are useful for the network intrusion domain assuming that introducing expert knowledge for correlation of rules is feasible.
引用
收藏
页码:281 / 322
页数:42
相关论文
共 50 条
  • [41] Network Intrusion Detection Based on Directed Acyclic Graph and Belief Rule Base
    Zhang, Bang-Cheng
    Hu, Guan-Yu
    Zhou, Zhi-Jie
    Zhang, You-Min
    Qiao, Pei-Li
    Chang, Lei-Lei
    ETRI JOURNAL, 2017, 39 (04) : 592 - 604
  • [42] Automated Flow-based Rule Generation for Network Intrusion Detection Systems
    Fallahi, Naser
    Sami, Ashkan
    Tajbakhsh, Morteza
    2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 1948 - 1953
  • [43] Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining
    Khamphakdee, Nattawat
    Benjamas, Nunnapus
    Saiyod, Saiyan
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2015, 8 (03) : 234 - 250
  • [44] A Statistical Rule Learning Approach to Network Intrusion Detection
    Rastegari, Samaneh
    Lam, Chiou-Peng
    Hingston, Philip
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [45] Measuring Inconsistency in Answer Set Programs
    Ulbricht, Markus
    Thimm, Matthias
    Brewka, Gerhard
    LOGICS IN ARTIFICIAL INTELLIGENCE, (JELIA 2016), 2016, 10021 : 577 - 583
  • [46] Network Intrusion Detection Using Class Association Rule Mining Based on Genetic Network Programming
    Chen, Ci
    Mabu, Shingo
    Shimada, Kaoru
    Hirasawa, Kotaro
    IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2010, 5 (05) : 553 - 559
  • [47] Research on IPv6 Intrusion Detection System Snort-based
    Shen Zihao
    Wang Hui
    2010 INTERNATIONAL CONFERENCE ON DISPLAY AND PHOTONICS, 2010, 7749
  • [48] AUTOMATION SNORT RULE FOR XSS DETECTION WITH HONEYPOT
    Syaifuddin
    Risqiwati, Diah
    Sidharta, Hanugra Aulia
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI 2018), 2018, : 584 - 588
  • [49] An integrated system of intrusion detection based on rough set and wavelet neural network
    Yu, Ling
    Chen, Bo
    Xiao, Jumno
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 194 - +
  • [50] Two Hybrid Methods Based on Rough Set Theory for Network Intrusion Detection
    Na Jiao
    Journal of Harbin Institute of Technology(New series), 2014, (06) : 22 - 27