2011
DOI: 10.1142/s1793351x11001274
|View full text |Cite
|
Sign up to set email alerts
|

Measuring Inconsistency in a Network Intrusion Detection Rule Set Based on Snort

Abstract: In this preliminary study, we investigate how inconsistency in a network intrusion detection rule set can be measured. To achieve this, we first examine the structure of these rules which are based on Snort and incorporate regular expression (Regex) pattern matching. We then identify primitive elements in these rules in order to translate the rules into their (equivalent) logical forms and to establish connections between them. Additional rules from background knowledge are also introduced to make the correlat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 23 publications
0
16
0
Order By: Relevance
“…For example, IDS rules in [MLMM11] and requirements specications in [MJLL05] are always dened in terms of arbitrary formulae. Applying these practical algorithms for computing MUSes to such real-world applications is a useful path for research, but since they require knowledge bases in clausal form, the algorithms cannot be directly applied.…”
Section: Associating Muses and Misesmentioning
confidence: 99%
See 3 more Smart Citations
“…For example, IDS rules in [MLMM11] and requirements specications in [MJLL05] are always dened in terms of arbitrary formulae. Applying these practical algorithms for computing MUSes to such real-world applications is a useful path for research, but since they require knowledge bases in clausal form, the algorithms cannot be directly applied.…”
Section: Associating Muses and Misesmentioning
confidence: 99%
“…Inconsistency has been studied extensively in a range of applications. For example, in network security, a logic-based analysis of inconsistency in an Intrusion Detection System (IDS) was carried out in [MLMM11]. In this case the industry standard IDS [Roe99], which was the focus of this work, had a false alarm rate of between 69% [TPFC08b] and 96% [TPFC08a] and it was suggested that this was, at least in part, the result of inconsistency in the rule set.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…For accuracy reason, the packet payload must be examined. Snort [4], an open source intrusion detection system, analyses payload signature. 70% of the whole processing time dedicates to the signature pat- tern matching.…”
Section: Introductionmentioning
confidence: 99%