Author :
Ho, Cheng-Yuan ; Lai, Yuan-Cheng ; Chen, I-Wei ; Wang, Fu-Yu ; Tai, Wei-Hsuan
Abstract :
False positives and false negatives happen to every intrusion detection and intrusion prevention system. This work proposes a mechanism for false positive/negative assessment with multiple IDSs/IPSs to collect FP and FN cases from real-world traffic and statistically analyze these cases. Over a period of 16 months, more than 2000 FPs and FNs have been collected and analyzed. From the statistical analysis results, we obtain three interesting findings. First, more than 92.85 percent of false cases are FPs even if the numbers of attack types for FP and FN are similar. That is mainly because the behavior of applications or the format of the application content is self-defined; that is, there is not complete conformance to the specifications of RFCs. Accordingly, when this application meets an IDS/IPS with strict detection rules, its traffic will be regarded as malicious traffic, resulting in a lot of FPs. Second, about 91 percent of FP alerts, equal to about 85 percent of false cases, are not related to security issues, but to management policy. For example, some companies and campuses limit or forbid their employees and students from using peer-to-peer applications; therefore, in order to easily detect P2P traffic, an IDS/IPS is configured to be sensitive to it. Hence, this causes alerts to be triggered easily regardless of whether the P2P application has malicious traffic or not. The last finding shows that buffer overflow, SQL server attacks, and worm slammer attacks account for 93 percent of FNs, even though they are aged attacks. This indicates that these attacks always have new variations to evade IDS/IPS detection.
Keywords :
computer network management; computer network security; peer-to-peer computing; statistical analysis; telecommunication traffic; IDS-IPS detection system; P2P traffic; SQL server attacks; buffer overflow; false positive-negative assessment; intrusion detection systems; intrusion prevention system; management policy; peer-to-peer applications; statistical analysis; worm slammer attacks; Intrusion detection; Peer to peer computing; Protocols; Servers; Statistical analysis; Telecommunication traffic;