DocumentCode :
160547
Title :
Protecting Run-Time Filters for Network Intrusion Detection Systems
Author :
Valgenti, Victor C. ; Hai Sun ; Min Sik Kim
Author_Institution :
Petabi, Inc., Irvine, CA, USA
fYear :
2014
fDate :
13-16 May 2014
Firstpage :
116
Lastpage :
122
Abstract :
Network Intrusion Detection Systems (NIDS) examine millions of network packets searching for malicious traffic. Multi-gigabit line-speeds combined with growing databases of rules lead to dropped packets as the load exceeds the capacity of the device. Several areas of research have attempted to mitigate this problem through improving packet inspection efficiency, increasing resources, or reducing the examined population. A popular method for reducing the population examined is to employ run-time filters that can provide a quick check to determine that a given network packet cannot match a particular rule set. While this technique is an excellent method for reducing the population under examination, rogue elements can trivially bypass such filters with specially crafted packets and render the run-time filters effectively useless. Since the filtering comes at the cost of extra processing a filtering solution could actually perform worse than a non-filtered solution under such pandemic circumstances. To defend against such attacks, it is necessary to consider run-time filters as an independent anomaly detector capable of detecting attacks against itself. Such anomaly detection, together with judicious rate-limiting of traffic forwarded to full packet inspection, allows the detection, logging, and mitigation of attacks targeted at the filters while maintaining the overall improvements in NIDS performance garnered from using run-time filters.
Keywords :
filters; security of data; telecommunication traffic; NIDS performance; anomaly detector; crafted packets; filtering solution; malicious traffic; multigigabit line-speeds; network intrusion detection systems; network packets; packet inspection; run-time filters; run-time filters protection; Automata; Detectors; Inspection; Intrusion detection; Limiting; Matched filters; Sociology; Deep Packet Inspection; Filters; IDS; Intrusion Detection; Network Security; Run-time Filters; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on
Conference_Location :
Victoria, BC
ISSN :
1550-445X
Print_ISBN :
978-1-4799-3629-8
Type :
conf
DOI :
10.1109/AINA.2014.19
Filename :
6838655
Link To Document :
بازگشت