Building Intrusion Pattern Miner for Snort Network Intrusion Detection System

碩士 === 國立雲林科技大學 === 電子與資訊工程研究所碩士班 === 91 === Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. However, Snort cannot generate intrusion pattern automatically. It means that experts must first analyze and ca...

Full description

Bibliographic Details
Main Authors: Sout-Fong Chen, 陳少鋒
Other Authors: none
Format: Others
Language:zh-TW
Published: 2003
Online Access:http://ndltd.ncl.edu.tw/handle/01429644317481328466
id ndltd-TW-091YUNT5393181
record_format oai_dc
spelling ndltd-TW-091YUNT53931812016-06-10T04:15:28Z http://ndltd.ncl.edu.tw/handle/01429644317481328466 Building Intrusion Pattern Miner for Snort Network Intrusion Detection System 在Snort網路型入侵偵測系統上建立入侵樣本探勘器 Sout-Fong Chen 陳少鋒 碩士 國立雲林科技大學 電子與資訊工程研究所碩士班 91 Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. However, Snort cannot generate intrusion pattern automatically. It means that experts must first analyze and categorize attack packets, and hand-code the corresponding patterns and rules for misuse detection. After that, system administrators configure Snort detection rules manually to the network intrusion detection system. This results in Snort having limited extensibility and adaptability. In this paper, we propose a framework for Snort to make it have the ability of not only catching new attack patterns automatically, but also detecting sequential attack behaviors. To do that, we first build an Intrusion Pattern Discovery Module to find single intrusion patterns and sequential intrusion patterns from a collection of attack packets in off-line training. The module applies data mining technique to extract descriptive attack signatures from large stores of packets, and then it converts the signatures to Snort detection rules for on-line detection. In order to detect sequential intrusion behavior, the Snort detection engine is accompanied with our Instruction Behavior Detection Engine. When a series of incoming packets match the signatures representing sequential intrusion scenarios, Instruction Behavior Detection Engine will make an alert. In summary, we enhance the functionality of Snort by adding the Intrusion Pattern Discovery Module and Instruction Behavior Detection Engine to the original Snort system. That not only makes Snort to mine instruction patterns automatically, but also extends the detecting ability of Snort. Furthermore, it improves the false negative rate and false positive rate for Snort misuse detection. none 伍麗樵 2003 學位論文 ; thesis 81 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立雲林科技大學 === 電子與資訊工程研究所碩士班 === 91 === Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. However, Snort cannot generate intrusion pattern automatically. It means that experts must first analyze and categorize attack packets, and hand-code the corresponding patterns and rules for misuse detection. After that, system administrators configure Snort detection rules manually to the network intrusion detection system. This results in Snort having limited extensibility and adaptability. In this paper, we propose a framework for Snort to make it have the ability of not only catching new attack patterns automatically, but also detecting sequential attack behaviors. To do that, we first build an Intrusion Pattern Discovery Module to find single intrusion patterns and sequential intrusion patterns from a collection of attack packets in off-line training. The module applies data mining technique to extract descriptive attack signatures from large stores of packets, and then it converts the signatures to Snort detection rules for on-line detection. In order to detect sequential intrusion behavior, the Snort detection engine is accompanied with our Instruction Behavior Detection Engine. When a series of incoming packets match the signatures representing sequential intrusion scenarios, Instruction Behavior Detection Engine will make an alert. In summary, we enhance the functionality of Snort by adding the Intrusion Pattern Discovery Module and Instruction Behavior Detection Engine to the original Snort system. That not only makes Snort to mine instruction patterns automatically, but also extends the detecting ability of Snort. Furthermore, it improves the false negative rate and false positive rate for Snort misuse detection.
author2 none
author_facet none
Sout-Fong Chen
陳少鋒
author Sout-Fong Chen
陳少鋒
spellingShingle Sout-Fong Chen
陳少鋒
Building Intrusion Pattern Miner for Snort Network Intrusion Detection System
author_sort Sout-Fong Chen
title Building Intrusion Pattern Miner for Snort Network Intrusion Detection System
title_short Building Intrusion Pattern Miner for Snort Network Intrusion Detection System
title_full Building Intrusion Pattern Miner for Snort Network Intrusion Detection System
title_fullStr Building Intrusion Pattern Miner for Snort Network Intrusion Detection System
title_full_unstemmed Building Intrusion Pattern Miner for Snort Network Intrusion Detection System
title_sort building intrusion pattern miner for snort network intrusion detection system
publishDate 2003
url http://ndltd.ncl.edu.tw/handle/01429644317481328466
work_keys_str_mv AT soutfongchen buildingintrusionpatternminerforsnortnetworkintrusiondetectionsystem
AT chénshǎofēng buildingintrusionpatternminerforsnortnetworkintrusiondetectionsystem
AT soutfongchen zàisnortwǎnglùxíngrùqīnzhēncèxìtǒngshàngjiànlìrùqīnyàngběntànkānqì
AT chénshǎofēng zàisnortwǎnglùxíngrùqīnzhēncèxìtǒngshàngjiànlìrùqīnyàngběntànkānqì
_version_ 1718299525804720128