Using decision trees to improve signature-based intrusion detection

被引:0
|
作者
Kruegel, C [1 ]
Toth, T
机构
[1] Univ Calif Santa Barbara, Reliable Software Grp, Santa Barbara, CA 93106 USA
[2] Tech Univ Vienna, Distributed Syst Grp, Vienna, Austria
关键词
signature-based intrusion detection; machine learning; network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most deployed intrusion detection systems (IDSs) follow a signature-based approach where attacks are identified by matching each input event against predefined signatures that model malicious activity. This matching process accounts for the most resource intensive task of an IDS. Many systems perform the matching by comparing each input event to all rules sequentially. This is far from being optimal. Although sometimes ad-hoc optimizations axe utilized, no general solution to this problem has been proposed so far. This paper describes an approach where machine learning clustering techniques are applied to improve the matching process. Given a set of signatures (each dictating. a number of constraints the input data must fulfill to trigger it) an algorithm generates a decision tree that is used to find malicious events using as few redundant comparisons as possible. This general idea has been applied to a network-based IDS. In particular, a system has been implemented that replaces the detection engine of Snort [14,16]. Experimental evaluation shows that the speed of the detection process has been significantly improved, even compared to Snort's recently released, fully revised detection engine.
引用
收藏
页码:173 / 191
页数:19
相关论文
共 50 条
  • [41] Signature-based IaaS Performance Change Detection
    Fattah, Sheik mohammad mostakim
    Bouguettaya, Athman
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2025, 25 (01)
  • [42] Toward intrusion detection using belief decision trees for big data
    Boukhris, Imen
    Elouedi, Zied
    Ajabi, Mariem
    KNOWLEDGE AND INFORMATION SYSTEMS, 2017, 53 (03) : 671 - 698
  • [43] Toward intrusion detection using belief decision trees for big data
    Imen Boukhris
    Zied Elouedi
    Mariem Ajabi
    Knowledge and Information Systems, 2017, 53 : 671 - 698
  • [44] A Review on Signature-Based Detection for Network Threats
    Li, Jing
    Li, Qinyuan
    Zhou, Sheng
    Yao, Ying
    Ou, Jing
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1117 - 1121
  • [45] Robust Signature-Based Hyperspectral Target Detection Using Dual Networks
    Gao, Yanlong
    Feng, Yan
    Yu, Xumin
    Mei, Shaohui
    IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, 2023, 20
  • [46] A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems
    H. Asad
    S. Adhikari
    Ilir Gashi
    International Journal of Information Security, 2024, 23 : 1331 - 1346
  • [47] SigRace: Signature-Based Data Race Detection
    Muzahid, Abdullah
    Suarez, Dario
    Qi, Shanxiang
    Torrellas, Josep
    ISCA 2009: 36TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, 2009, : 337 - 348
  • [48] Robust Signature-Based Hyperspectral Target Detection Using Dual Networks
    Gao, Yanlong
    Feng, Yan
    Yu, Xumin
    Mei, Shaohui
    IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, 2023, 20
  • [49] A Reconfigurable Multi-Byte Regular-Expression Matching Architecture for Signature-Based Intrusion Detection
    Badran, Tamer F.
    Ahmad, Hany H.
    Abdelgawad, Mohamad
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2571 - 2574
  • [50] Signature-Based Community Detection for Time Series
    Gregnanin, Marco
    De Smedt, Johannes
    Gnecco, Giorgio
    Parton, Maurizio
    COMPLEX NETWORKS & THEIR APPLICATIONS XII, VOL 2, COMPLEX NETWORKS 2023, 2024, 1142 : 146 - 158