Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection

被引:25
作者
Meng, Yuxin [1 ]
Kwok, Lam-For [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
关键词
Network intrusion detection; Packet filter; Blacklist generation; Adaptive system; Signature matching; CLASSIFICATION;
D O I
10.1016/j.jnca.2013.05.009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection systems (NIDS) are widely deployed in various network environments. Compared to an anomaly based NIDS, a signature-based NIDS is more popular in real-world applications, because of its relatively lower false alarm rate. However, the process of signature matching is a key limiting factor to impede the performance of a signature-based NIDS, in which the cost is at least linear to the size of an input string and the CPU occupancy rate can reach more than 80% in the worst case. In this paper, we develop an adaptive blacklist-based packet filter using a statistic-based approach aiming to improve the performance of a signature-based NIDS. The filter employs a blacklist technique to help filter out network packets based on IP confidence and the statistic-based approach allows the blacklist generation in an adaptive way, that is, the blacklist can be updated periodically. In the evaluation, we give a detailed analysis of how to select weight values in the statistic-based approach, and investigate the performance of the packet filter with a DARPA dataset, a real dataset and in a real network environment. Our evaluation results under various scenarios show that our proposed packet filter is encouraging and effective to reduce the burden of a signature-based NIDS without affecting network security. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:83 / 92
页数:10
相关论文
共 43 条
[1]   EFFICIENT STRING MATCHING - AID TO BIBLIOGRAPHIC SEARCH [J].
AHO, AV ;
CORASICK, MJ .
COMMUNICATIONS OF THE ACM, 1975, 18 (06) :333-340
[2]  
[Anonymous], LECT NOTES COMPUT SC
[3]  
[Anonymous], 2005, FPGA 05
[4]  
[Anonymous], 1999, DARPA Intrusion Detection Evaluation Dataset
[5]  
[Anonymous], 2012, MCAF THREAT REP 2 QU
[6]  
[Anonymous], 2007, NIST SPECIAL PUBLICA
[7]  
[Anonymous], P 8 ANN COLL EL MESS
[8]  
[Anonymous], 2010, INFOCOM
[9]   Bayesian neural networks for Internet traffic classification [J].
Auld, Tom ;
Moore, Andrew W. ;
Gull, Stephen F. .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2007, 18 (01) :223-239
[10]  
Axelsson S, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P1, DOI 10.1145/319709.319710