Improving Intrusion Detection System Based on Snort Rules for Network Probe Attack Detection

被引:0
作者
Khamphakdee, Nattawat [1 ,2 ]
Benjamas, Nunnapus [1 ,2 ]
Saiyod, Saiyan [1 ,3 ]
机构
[1] Khon Kaen Univ, Fac Sci, Dept Comp Sci, Khon Kaen, Thailand
[2] Adv Smart Comp Lab, Khon Kaen, Thailand
[3] Hardware Human Interface & Commun Lab, Khon Kaen, Thailand
来源
2014 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT) | 2014年
关键词
Intrusion Detection System (IDS); Snort-IDS rule; Network Security; Network probe attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data and network system security is the most important roles. An organization should find the methods to protect their data and network system to reduce the risk from attacks. Snort Intrusion Detection System (Snort-IDS) is a security tool of network security. It has been widely used for protecting the network of the organizations. The Snort-IDS utilize the rules to matching data packets traffic. If some packet matches the rules, Snort-IDS will generate the alert messages. However, Snort-IDS contain many rules and it also generates a lot of false alerts. In this paper, we present the procedure to improve the Snort-IDS rules for the network probe attack detection. In order to test the performance evaluation, we utilized the data set from the MIT-DAPRA 1999, which includes the normal and abnormal traffics. Firstly, we analyzed and explored the existing the Snort-IDS rules to improve the proposed Snort-IDS rules. Secondly, we applied the WireShark software to analyze data packets form of attack in data set. Finally, the Snort-IDS was improved, and it can detect the network probe attack. This paper, we had classified the attacks into several groups based on the nature of network probe attack. In addition, we also compared the efficacy of detection attacks between Snort-IDS rules to be updated with the Detection Scoring Truth. As the experimental results, the proposed Snort-IDS efficiently detected the network probe attacks compared to the Detection Scoring Truth. It can achieve higher accuracy. However, there were some detecting alert that occur over the attack in Detection Scoring Truth, because some attack occur in several time but the Detection Scoring Truth indentify as one time.
引用
收藏
页数:6
相关论文
共 13 条
[1]  
Changwei Huang, 2012, Proceedings of the 2012 IEEE Symposium on Robotics and Applications (ISRA), P596, DOI 10.1109/ISRA.2012.6219259
[2]  
Dabbour M, 2013, INT J SECUR APPL, V7, P7
[3]  
EL-Dia Riad A., 2012, IJCSI INT J COMPUTER, P486
[4]  
Kumar V., 2012, INT J COMPUT APPL IN, V1, P35
[5]  
MIT-DARPA, 1999, INTR DET SYST EV DAT
[6]  
Patel Nishidh, 2013, J INFORM KNOWLEDGE R, P432
[7]  
Rani Suman, 2012, INT J COMPUTER TECHN
[8]  
Shah Sagar N., 2012, INT J ENG RES TECHNO, P1
[9]  
Sonawane S., 2012, World Journal of Science and Technology, V2, P127
[10]  
Xiaojin Hong, 2012, 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN 2012), P441, DOI 10.1109/CICN.2012.207