Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1323548.1323576acmconferencesArticle/Chapter ViewAbstractPublication PagesancsConference Proceedingsconference-collections
research-article

Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems

Published: 03 December 2007 Publication History

Abstract

A traditional Network Intrusion Detection System (NIDS) is based on a centralized architecture that does not satisfy the needs of most modern network infrastructures characterized by high traffic volumes and complex topologies. The of decentralized NIDS based on multiple sensors is that each of them gets just a partial view of the network traffic and this prevents a stateful and fully reliable traffic analysis. We propose a novel cooperation mechanism that the previous issues through an innovative state management and state migration framework. It allows multiple decentralized sensors to share their internal state, thus accomplishing innovative and powerful traffic analysis. The advanced functionalities and performance of the proposed cooperative framework for network intrusion detection systems are demonstrated through a fully operative prototype.

References

[1]
M. Andreolini, M. Colajanni, and M. Nuccio. Scalability of content-aware server switches for cluster-based web information systems.In Proc. of the 12th International World Wide Web Conference (WWW2003)Budapest, Hungary, May 2003.
[2]
V. Cardellini, E. Casalicchio, M. Colajanni, and P. S. Yu. The state of the art in locally distributed web-server systems. ACM Computing Surveys 34(2):263--311, 2002.
[3]
C. J. Coit, S. Staniford, and J. McAlerney. Towards faster string matching for intrusion detection or exceeding the speed of snort. In Proc. of the DARPA Information Survivability Conference and Exposition 2001.
[4]
M. Colajanni and M. Marchetti. A parallel architecture for stateful intrusion detection in high traffic networks. In Proc. of the IEEE/IST Workshop on "Monitoring, attack detection and mitigation" (MonAM 2006)Tuebingen, Germany, September 2006.
[5]
A. Constantine and R. Stadler. Adaptable sevrer cluster with QoS constraints. In Proc. of the 9th IFIP/IEEE International Symposium on Integrated Network Management Nice, France, May 2005.
[6]
H. Dreger, A. Feldmann, V. Paxson, and R. Sommer. Operational experiences with high-volume network intrusion detection. In Proc. of the 11th ACM conference on Computer and communications security 2004.
[7]
IETF Intrusion Detection Working Group. The intrusion detection message exchange format, 2006.
[8]
C. Kruegel, F. Valeur, G. Vigna,and R. Kemmerer. Stateful intrusion detection for high-speed networks. In Proc. of the IEEE Symposium on Research on Security and Privacy Oakland, CA,USA, May 2002.
[9]
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das. Analysis and results of the 1999 darpa off-line intrusion detection evaluation. In Proc. of the Third International Workshop on Recent Advances in Intrusion Detection Toulouse, France, October 2000.
[10]
D. S. Milojičić, F. Douglis, Y. Paindaveine, R. Wheeler, and S.Zhou.Process migration. ACM Comput. Surv.32(3): 241--299, 2000.
[11]
V. A. Pham and A. Karmouch. Mobile software agents: An overview. IEEE Communication Magazine 36(7):16--37, 1998.
[12]
P. Porras, D. Schnackenberg, S. Staniford-Chen, Davis, M. Stillman, and F. Wu. The common intrusion detection framework architecture, 1999.
[13]
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report,Secure Networks,Inc., Suite 330, 1201 5th Street S. W, Calgary, Alberta, Canada, T2R-0Y6, 1998.
[14]
L. Schaelicke, T. Slabach, B. Moore, and C. Freeland. Characterizing the performance of network intrusion detection sensors. In Proc. of the Sixth International Symposium on Recent Advances in Intrusion Detection Pittsburgh, PA, USA, September 2003.
[15]
L. Schaelicke, K. Wheeler, and C. Freeland. Spanids: a scalable network intrusion detection loadbalancer. In Proc. of the 2nd conference on Computing frontiers Ischia, Italy, May 2005.
[16]
R. Sommer and V. Paxson. Exploiting independent state for network intrusion detection. In Proc. of the 21st Annual Computer Security Applications Conference Tucson, AZ, USA, December 2005.
[17]
N. Tuck, T. Sherwood, B. Calder, and G. Varghese. Deterministic memory-efficient string matching algorithms fo intrusion detection. In Proc. of the IEEE Conference on Computer Communication Hong Kong, China, March 2004.
[18]
D. Winer. XMLRPC, 2007.
[19]
K. Xinidis, I. Charitakis, S. Antonatos, K. G. Anagnostakis, and E. P. Markatos. An active splitter architecture for intrusion detection and prevention. IEEE Transactions on Dependable and Secure Computing 03(1):31--44,2006.

Cited By

View all
  • (2017)Scalable architecture for online prioritisation of cyber threats2017 9th International Conference on Cyber Conflict (CyCon)10.23919/CYCON.2017.8240337(1-18)Online publication date: May-2017
  • (2017)Detecting attacks to internal vehicle networks through Hamming distance2017 AEIT International Annual Conference10.23919/AEIT.2017.8240550(1-6)Online publication date: Sep-2017
  • (2017)Anomaly detection of CAN bus messages through analysis of ID sequences2017 IEEE Intelligent Vehicles Symposium (IV)10.1109/IVS.2017.7995934(1577-1583)Online publication date: Jun-2017
  • Show More Cited By

Index Terms

  1. Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ANCS '07: Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems
    December 2007
    212 pages
    ISBN:9781595939456
    DOI:10.1145/1323548
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 December 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. distributed architectures
    2. network intrusion detection systems
    3. state migration
    4. traffic analysis

    Qualifiers

    • Research-article

    Conference

    ANCS07

    Acceptance Rates

    ANCS '07 Paper Acceptance Rate 20 of 70 submissions, 29%;
    Overall Acceptance Rate 88 of 314 submissions, 28%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 17 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)Scalable architecture for online prioritisation of cyber threats2017 9th International Conference on Cyber Conflict (CyCon)10.23919/CYCON.2017.8240337(1-18)Online publication date: May-2017
    • (2017)Detecting attacks to internal vehicle networks through Hamming distance2017 AEIT International Annual Conference10.23919/AEIT.2017.8240550(1-6)Online publication date: Sep-2017
    • (2017)Anomaly detection of CAN bus messages through analysis of ID sequences2017 IEEE Intelligent Vehicles Symposium (IV)10.1109/IVS.2017.7995934(1577-1583)Online publication date: Jun-2017
    • (2017)Snort Rule Detection for Countering in Network AttacksProceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications10.1007/978-981-10-3153-3_57(573-583)Online publication date: 17-Mar-2017
    • (2016)Implementation of Verified Set Operation Protocols Based on Bilinear AccumulatorsCryptology and Network Security10.1007/978-3-319-48965-0_41(626-636)Online publication date: 28-Oct-2016
    • (2013)A Low-Energy Variation-Tolerant Asynchronous TCAM for Network Intrusion Detection SystemsProceedings of the 2013 IEEE 19th International Symposium on Asynchronous Circuits and Systems10.1109/ASYNC.2013.16(8-15)Online publication date: 19-May-2013
    • (2011)Defeating NIDS evasion in Mobile IPv6 networksProceedings of the 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks10.1109/WoWMoM.2011.5986488(1-9)Online publication date: 20-Jun-2011
    • (2011)A Survey on the Application of FPGAs for Network Infrastructure SecurityIEEE Communications Surveys & Tutorials10.1109/SURV.2011.072210.0007513:4(541-561)Online publication date: 2011
    • (2011)The Problem of NIDS Evasion in Mobile Networks2011 4th IFIP International Conference on New Technologies, Mobility and Security10.1109/NTMS.2011.5721046(1-6)Online publication date: Feb-2011
    • (2010)Performance assessment of a distributed intrusion detection system in a real network scenario2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS)10.1109/CRISIS.2010.5764922(1-8)Online publication date: Oct-2010

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media