• DocumentCode
    3516622
  • Title

    Automated Technique for Debugging Network Intrusion Detection Systems

  • Author

    Nehinbe, Joshua Ojo

  • Author_Institution
    Univ. of Essex, Colchester, UK
  • fYear
    2010
  • fDate
    27-29 Jan. 2010
  • Firstpage
    362
  • Lastpage
    367
  • Abstract
    Signature-based Intrusion Detection Systems have numerous redundant rules that do not match network attacks during intrusion detections. Instead, the toolkits have low efficacies in matching each packet with all the detection rules to avoid false positives. Unfortunately, there are no automatic functionalities to debug expert systems so that all noisy signatures and rules set that trigger false alerts are isolated. Hence, heuristic methods are wrongly applied in realistic networks. Consequently, there are alarming cases of network attacks despite the inclusion of network detectors on the networks. Therefore, this paper presents an automated approach that enable system administrators to debug network detectors. We matched alerts that a network detector generated together to identify equivalent, duplicate and unique rules. Furthermore, we merged equivalent rules together to reduce them to unique rules and this method has efficiently debugged expert systems when we benchmarked it with different kinds of realistic and synthetic datasets.
  • Keywords
    computer debugging; security of data; expert system debugging; intrusion detection systems; network attacks; network debugging; network detectors; realistic networks; system administrators; Computer networks; Debugging; Detectors; Event detection; Expert systems; Intelligent networks; Intelligent systems; Intrusion detection; Organizational aspects; Protection; intrusion aggregations; overlapping rules; signatures;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Systems, Modelling and Simulation (ISMS), 2010 International Conference on
  • Conference_Location
    Liverpool
  • Print_ISBN
    978-1-4244-5984-1
  • Type

    conf

  • DOI
    10.1109/ISMS.2010.72
  • Filename
    5416067