Using decision trees to improve signature-based intrusion detection

被引:0
|
作者
Kruegel, C [1 ]
Toth, T
机构
[1] Univ Calif Santa Barbara, Reliable Software Grp, Santa Barbara, CA 93106 USA
[2] Tech Univ Vienna, Distributed Syst Grp, Vienna, Austria
关键词
signature-based intrusion detection; machine learning; network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most deployed intrusion detection systems (IDSs) follow a signature-based approach where attacks are identified by matching each input event against predefined signatures that model malicious activity. This matching process accounts for the most resource intensive task of an IDS. Many systems perform the matching by comparing each input event to all rules sequentially. This is far from being optimal. Although sometimes ad-hoc optimizations axe utilized, no general solution to this problem has been proposed so far. This paper describes an approach where machine learning clustering techniques are applied to improve the matching process. Given a set of signatures (each dictating. a number of constraints the input data must fulfill to trigger it) an algorithm generates a decision tree that is used to find malicious events using as few redundant comparisons as possible. This general idea has been applied to a network-based IDS. In particular, a system has been implemented that replaces the detection engine of Snort [14,16]. Experimental evaluation shows that the speed of the detection process has been significantly improved, even compared to Snort's recently released, fully revised detection engine.
引用
收藏
页码:173 / 191
页数:19
相关论文
共 50 条
  • [31] Improving the performance of Signature-Based Network Intrusion Detection Sensors by multi-threading
    Haagdorens, B
    Vermeiren, T
    Goossens, M
    INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 188 - 203
  • [32] Using decision trees to improve the accuracy of vehicle signature reidentification
    Tawfik, AY
    Abdulhal, B
    Peng, AD
    Tabib, SM
    INTELLIGENT TRANSPORTATION SYSTEMS AND VEHICLE-HIGHWAY AUTOMATION 2004, 2004, (1886): : 24 - 33
  • [33] Machine Learning Architecture for Signature-based IoT Intrusion Detection in Smart Energy Grids
    Yadav, Nikhil
    Truong, Laura
    Troja, Erald
    Aliasgari, Mehrdad
    2022 IEEE 21ST MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (IEEE MELECON 2022), 2022, : 671 - 676
  • [34] A memory-based NFA regular expression match engine for signature-based intrusion detection
    Pao, Derek
    Or, Nga Lam
    Cheung, Ray C. C.
    COMPUTER COMMUNICATIONS, 2013, 36 (10-11) : 1255 - 1267
  • [35] MapReduce Accelerated Signature-Based Intrusion Detection Mechanism (IDM) with Pattern Matching Mechanism
    Rao, Chinta Someswara
    Raju, K. Butchi
    SOFT COMPUTING IN DATA ANALYTICS, SCDA 2018, 2019, 758 : 157 - 164
  • [36] Signature-Based Intrusion Detection System (IDS) for In-Vehicle CAN Bus Network
    Jin, Shiyi
    Chung, Jin-Gyun
    Xu, Yinan
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [37] Intelligent network intrusion detection using alternating decision trees
    Jabbar, M. A.
    Samreen, Shirina
    2016 INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROLS, COMMUNICATIONS AND COMPUTING (I4C), 2016,
  • [38] A Collaborative and Adaptive Intrusion Detection Based on SVMs and Decision Trees
    Teng, Luyao
    Teng, Shaohua
    Tang, Feiyi
    Zhu, Haibin
    Zhang, Wei
    Liu, Dongning
    Liang, Lu
    2014 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW), 2014, : 898 - 905
  • [39] Multiresolution signature-based SAR target detection
    McClure, M
    Bharadwaj, P
    Carin, L
    ALGORITHMS FOR SYNTHETIC APERTURE RADAR IMAGERY V, 1998, 3370 : 318 - 329
  • [40] Decision trees approach for anomaly intrusion detection
    Nagata, Tomokazu
    Lee, Jaeho
    Su, Wenhung
    Kinjo, Atsushi
    Shiroma, Tadashi
    Taniguchi, Yuji
    Tamaki, Shiro
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2007, 10 (05): : 619 - 630