Characterizing Realistic Signature-based Intrusion Detection Benchmarks

被引:4
作者
Aldwairi, Monther [1 ,2 ]
Alshboul, Mohammad A. [3 ]
Seyam, Asmaa [2 ]
机构
[1] Jordan Univ Sci & Technol, Fac Comp & Informat Technol, Irbid 22110, Jordan
[2] Zayed Univ, Coll Technol Innovat, Abu Dhabi 144534, U Arab Emirates
[3] North Carolina State Univ, Dept Elect & Comp Engn, Raleigh, NC 27606 USA
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018) | 2018年
关键词
Intrusion detection; Pattern matching; Benchmarks; Attack signatures; Traffic traces;
D O I
10.1145/3301551.3301591
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Speeding up pattern matching for intrusion detection systems has been a growing field of research. There has been a flux of new algorithms, modifications to existing algorithms and even hardware architectures aimed at improving pattern matching performance. Establishing an accurate comparison to related work is a real challenge because researchers use different datasets and metrics to evaluate their work. The purpose of this paper is to characterize and identify realistic workloads, propose standard benchmarks, and establish common metrics to better compare work in the area of pattern matching for intrusion detection. We collect traffic traces and attack signatures from popular open source platforms. The datasets are processed, cleansed and studied, to give the researchers a better understanding of their characteristics. The final datasets along with detailed information about their origins, contents, features, statistical analysis and performance evaluation using well-known pattern-matching algorithms are available to the public. In addition, we provide a generic parser capable of parsing different intrusion detection systems rule formats and extract attack signatures. Finally, a pattern-matching engine that enables researchers to plug-and-play their new pattern matching algorithms and compare to existing algorithms using the predefined metrics.
引用
收藏
页码:97 / 103
页数:7
相关论文
共 31 条
[21]  
Nehinbe J. O., 2011, Proceedings of the 2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS), P92, DOI 10.1109/CIS.2011.6169141
[22]  
Open source host-based intrusion detection system (OSSEC), 2010, OSSEC PROJ
[23]  
Paxson V., 2006, BRO INTRUSION DETECT
[24]  
Rehman R.U., 2003, Intrusion Detection Systems with Snort
[25]   Toward developing a systematic approach to generate benchmark datasets for intrusion detection [J].
Shiravi, Ali ;
Shiravi, Hadi ;
Tavallaee, Mahbod ;
Ghorbani, Ali A. .
COMPUTERS & SECURITY, 2012, 31 (03) :357-374
[26]  
Song J., 2006, Description of Kyoto University benchmark data
[27]  
Tavallace M, 2009, P IEEE S COMP INT SE, P1, DOI [DOI 10.1109/CISDA.2009.5356528, 10.1109/CISDA.2009.5356528]
[28]  
Vandoorselaere Y., 1998, PRELUDE UNIVERSAL OP
[29]  
Wichmann R., 2006, SAMHAIN FILE INTEGRI
[30]  
Wu S., 1994, TR9417 U AR DEP COMP