DocumentCode :
1944080
Title :
Toward Automatic Generation of Intrusion Detection Verification Rules
Author :
Massicott, Frederic ; Labiche, Yvan ; Briand, Lionel C.
Author_Institution :
Commun. Res. Centre Canada, Ottawa, ON
fYear :
2008
fDate :
8-12 Dec. 2008
Firstpage :
279
Lastpage :
288
Abstract :
An Intrusion Detection System (IDS) is a crucial element of a network security posture. One class of IDS, called signature-based network IDSs, monitors network traffic, looking for evidence of malicious behavior as specified in attack descriptions (referred to as signatures). Many studies have reported that IDSs can generate thousands of alarms a day, many of which are false alarms. The problem often lies in the low accuracy of IDS signatures. It is therefore important to have more accurate signatures in order to reduce the number of false alarms. One part of the false alarm problem is the inability of IDSs to verify attacks (i.e. distinguish between successful and failed attacks). If IDSs were able to accurately verify attacks, this would reduce the number of false alarms a network administrator has to investigate. In this paper, we demonstrate the feasibility of using a data mining algorithm to automatically generate IDS verification rules. We show that this automated approach is effective in reducing the number of false alarms when compared to other widely used and maintained IDSs.
Keywords :
data mining; digital signatures; program verification; data mining algorithm; intrusion detection verification rule; malicious behavior; network traffic monitoring; signature-based network security; Application software; Computer security; Databases; Drives; Intrusion detection; Laboratories; Protocols; Software quality; Systems engineering and theory; Telecommunication traffic; Intrusion Detection; Machine Learning;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2008. ACSAC 2008. Annual
Conference_Location :
Anaheim, CA
ISSN :
1063-9527
Print_ISBN :
978-0-7695-3447-3
Type :
conf
DOI :
10.1109/ACSAC.2008.27
Filename :
4721565
Link To Document :
بازگشت