Using decision trees to improve signature-based intrusion detection

被引:0
|
作者
Kruegel, C [1 ]
Toth, T
机构
[1] Univ Calif Santa Barbara, Reliable Software Grp, Santa Barbara, CA 93106 USA
[2] Tech Univ Vienna, Distributed Syst Grp, Vienna, Austria
关键词
signature-based intrusion detection; machine learning; network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most deployed intrusion detection systems (IDSs) follow a signature-based approach where attacks are identified by matching each input event against predefined signatures that model malicious activity. This matching process accounts for the most resource intensive task of an IDS. Many systems perform the matching by comparing each input event to all rules sequentially. This is far from being optimal. Although sometimes ad-hoc optimizations axe utilized, no general solution to this problem has been proposed so far. This paper describes an approach where machine learning clustering techniques are applied to improve the matching process. Given a set of signatures (each dictating. a number of constraints the input data must fulfill to trigger it) an algorithm generates a decision tree that is used to find malicious events using as few redundant comparisons as possible. This general idea has been applied to a network-based IDS. In particular, a system has been implemented that replaces the detection engine of Snort [14,16]. Experimental evaluation shows that the speed of the detection process has been significantly improved, even compared to Snort's recently released, fully revised detection engine.
引用
收藏
页码:173 / 191
页数:19
相关论文
共 50 条
  • [21] An Architecture for Blockchain-Enabled Collaborative Signature-based Intrusion Detection System
    Laufenberg, Daniel
    Li, Lei
    Shahriar, Hossain
    Han, Meng
    PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19), 2019, : 169 - 169
  • [22] FIXIDS: A High-Speed Signature-based Flow Intrusion Detection System
    Erlacher, Felix
    Dressler, Falko
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [23] Applying hardware-based machine learning to signature-based network intrusion detection
    Payer, Garrett
    McCormick, Chris
    Harang, Richard
    MACHINE INTELLIGENCE AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS VIII, 2014, 9119
  • [24] False alarm minimization techniques in signature-based intrusion detection systems: A survey
    Hubballi, Neminath
    Suryanarayanan, Vinoth
    COMPUTER COMMUNICATIONS, 2014, 49 : 1 - 17
  • [25] Designing Network Intrusion and Detection System using Signature-Based Method for Protecting OpenStack Private Cloud
    Santoso, Berkah I.
    Idrus, M. Rien Suryatama
    Gunawan, Irwan Prasetya
    2016 6TH INTERNATIONAL ANNUAL ENGINEERING SEMINAR (INAES), 2016, : 61 - 66
  • [26] Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering
    Ahmed, Usama
    Nazir, Mohammad
    Sarwar, Amna
    Ali, Tariq
    Aggoune, El-Hadi M.
    Shahzad, Tariq
    Khan, Muhammad Adnan
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [27] EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism
    Meng, Weizhi
    Li, Wenjuan
    Kwok, Lam-For
    COMPUTERS & SECURITY, 2014, 43 : 189 - 204
  • [28] A Comparison of Neural-Network-Based Intrusion Detection against Signature-Based Detection in IoT Networks
    Schroetter, Max
    Niemann, Andreas
    Schnor, Bettina
    INFORMATION, 2024, 15 (03)
  • [29] Improving the intrusion detection systems performance using fuzzy decision trees and decision trees
    Hogo, Mofreh A.
    WMSCI 2007: 11TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS, 2007, : 230 - 235
  • [30] A fog-based privacy-preserving approach for distributed signature-based intrusion detection
    Wang, Yu
    Meng, Weizhi
    Li, Wenjuan
    Li, Jin
    Liu, Wai-Xi
    Xiang, Yang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 122 : 26 - 35