Analysis of update delays in signature-based network intrusion detection systems

被引:19
作者
Gascon, Hugo [1 ]
Orfila, Agustin [1 ]
Blasco, Jorge [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Madrid 28911, Spain
关键词
Intrusion detection; Vulnerability; Signature update; Exploit; Patch; NIDS; VDS; Snort; Nessus; VULNERABILITY DISCLOSURE;
D O I
10.1016/j.cose.2011.08.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection Systems (NIDS) play a fundamental role on security policy deployment and help organizations in protecting their assets from network attacks. Signature-based NIDS rely on a set of known patterns to match malicious traffic. Accordingly, they are unable to detect a specific attack until a specific signature for the corresponding vulnerability is created, tested, released and deployed. Although vital, the delay in the updating process of these systems has not been studied in depth. This paper presents a comprehensive statistical analysis of this delay in relation to the vulnerability disclosure time, the updates of vulnerability detection systems (VDS), the software patching releases and the publication of exploits. The widely deployed NIDS Snort and its detection signatures release dates have been used. Results show that signature updates are typically available later than software patching releases. Moreover, Snort rules are generally released within the first 100 days from the vulnerability disclosure and roost of the times exploits and the corresponding NIDS rules are published with little difference. Implications of these results are drawn in the context of security policy definition. This study can be easily kept up to date due to the methodology used. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:613 / 624
页数:12
相关论文
共 32 条
[1]   Rule generalisation in intrusion detection systems using SNORT [J].
Aickelin, Uwe ;
Twycross, Jamie ;
Hesketh-Roberts, Thomas .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) :101-116
[2]  
[Anonymous], 2011, REAL TIM NETW AW
[3]  
[Anonymous], 2010, EASYFIT DISTRIBUTION
[4]  
[Anonymous], NATL VULNERABILITY D
[5]  
[Anonymous], 2006, ASIACCS 06
[6]  
[Anonymous], 2010, SNORT INTR DET SYST
[7]  
[Anonymous], 2010, NESSUS VULNERABILITY
[8]  
[Anonymous], 2010, BUGTRAQ VULNERABILIT
[9]   Does information security attack frequency increase with vulnerability disclosure? An empirical analysis [J].
Arora, Ashish ;
Nandkumar, Anand ;
Telang, Rahul .
INFORMATION SYSTEMS FRONTIERS, 2006, 8 (05) :350-362
[10]   A comparison of Intrusion Detection Systems [J].
Biermann, E ;
Cloete, E ;
Venter, LM .
COMPUTERS & SECURITY, 2001, 20 (08) :676-683