Variables influencing the effectiveness of signature-based network intrusion detection systems

T. Sommestad, Hannes Holm, Daniel Steinvall
{"title":"Variables influencing the effectiveness of signature-based network intrusion detection systems","authors":"T. Sommestad, Hannes Holm, Daniel Steinvall","doi":"10.1080/19393555.2021.1975853","DOIUrl":null,"url":null,"abstract":"ABSTRACT Contemporary organizations often employ signature-based network intrusion detection systems to increase the security of their computer networks. The effectiveness of a signature-based system primarily depends on the quality of the rules used to associate system events to known malicious behavior. However, the variables that determine the quality of rulesets is relatively unknown. This paper empirically analyzes the detection probability in a test involving Snort for 1143 exploitation attempts and 12 Snort rulesets created by the Emerging Threats Labs and the Sourcefire Vulnerability Research Team. The default rulesets from Emerging Threats raised priority-1-alerts for 39% of the exploit attempts compared to 31% for rulesets from the Vulnerability Research Team. The following features predict detection probability: if the exploit is publicly known, if the ruleset references the exploited vulnerability, the payload, the type of software targeted, and the operating system of the targeted software. The importance of these variables depends on the ruleset used and whether default rules are used. A logistic regression model with these variables classifies 69–92% of the cases correctly for the different rulesets.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Journal: A Global Perspective","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/19393555.2021.1975853","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

ABSTRACT Contemporary organizations often employ signature-based network intrusion detection systems to increase the security of their computer networks. The effectiveness of a signature-based system primarily depends on the quality of the rules used to associate system events to known malicious behavior. However, the variables that determine the quality of rulesets is relatively unknown. This paper empirically analyzes the detection probability in a test involving Snort for 1143 exploitation attempts and 12 Snort rulesets created by the Emerging Threats Labs and the Sourcefire Vulnerability Research Team. The default rulesets from Emerging Threats raised priority-1-alerts for 39% of the exploit attempts compared to 31% for rulesets from the Vulnerability Research Team. The following features predict detection probability: if the exploit is publicly known, if the ruleset references the exploited vulnerability, the payload, the type of software targeted, and the operating system of the targeted software. The importance of these variables depends on the ruleset used and whether default rules are used. A logistic regression model with these variables classifies 69–92% of the cases correctly for the different rulesets.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
影响基于签名的网络入侵检测系统有效性的变量
现代组织经常采用基于签名的网络入侵检测系统来增加其计算机网络的安全性。基于签名的系统的有效性主要取决于用于将系统事件与已知恶意行为关联的规则的质量。然而,决定规则集质量的变量是相对未知的。本文对新兴威胁实验室和Sourcefire漏洞研究团队创建的1143次利用尝试和12个Snort规则集的Snort测试检测概率进行了实证分析。新兴威胁的默认规则集对39%的攻击尝试发出了优先级1警报,而漏洞研究团队的规则集则为31%。以下特征预测检测概率:如果漏洞是公开的,如果规则集引用了被利用的漏洞,有效载荷,目标软件的类型以及目标软件的操作系统。这些变量的重要性取决于所使用的规则集以及是否使用默认规则。具有这些变量的逻辑回归模型对不同规则集的69-92%的情况进行了正确分类。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
“The pull to do nothing would be strong”: limitations & opportunities in reporting insider threats Prevention of DDoS attacks: a comprehensive review and future directions Towards improving the security of wireless networks using secured session keys Evaluating the status of information security management in faculty libraries: a case study of Allameh Tabatabai University Privacy preservation of inventory management using adaptive key generation with Hyperledger blockchain technology
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1