Extending Signature-based Intrusion Detection Systems WithBayesian Abductive Reasoning

03/28/2019
by   Ashwinkumar Ganesan, et al.
0

Evolving cybersecurity threats are a persistent challenge for systemadministrators and security experts as new malwares are continu-ally released. Attackers may look for vulnerabilities in commercialproducts or execute sophisticated reconnaissance campaigns tounderstand a targets network and gather information on securityproducts like firewalls and intrusion detection / prevention systems(network or host-based). Many new attacks tend to be modificationsof existing ones. In such a scenario, rule-based systems fail to detectthe attack, even though there are minor differences in conditions /attributes between rules to identify the new and existing attack. Todetect these differences the IDS must be able to isolate the subset ofconditions that are true and predict the likely conditions (differentfrom the original) that must be observed. In this paper, we proposeaprobabilistic abductive reasoningapproach that augments an exist-ing rule-based IDS (snort [29]) to detect these evolved attacks by (a)Predicting rule conditions that are likely to occur (based on existingrules) and (b) able to generate new snort rules when provided withseed rule (i.e. a starting rule) to reduce the burden on experts toconstantly update them. We demonstrate the effectiveness of theapproach by generating new rules from the snort 2012 rules set andtesting it on the MACCDC 2012 dataset [6].

READ FULL TEXT

page 7

page 8

page 9

research
09/05/2012

Automatic firewall rules generator for anomaly detection systems with Apriori algorithm

Network intrusion detection systems have become a crucial issue for comp...
research
07/29/2023

Detection and Classification of Novel Attacks and Anomaly in IoT Network using Rule based Deep Learning Model

Attackers are now using sophisticated techniques, like polymorphism, to ...
research
12/01/2012

An Evolution Strategy Approach toward Rule-set Generation for Network Intrusion Detection Systems (IDS)

With the increasing number of intrusions in system and network infrastru...
research
08/09/2023

Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance

Provenance graphs are structured audit logs that describe the history of...
research
09/18/2020

Experimental Review of Neural-based approaches for Network Intrusion Management

The use of Machine Learning (ML) techniques in Intrusion Detection Syste...
research
06/16/2018

Detecting intrusions in control systems: a rule of thumb, its justification and illustrations

Control systems are exposed to unintentional errors, deliberate intrusio...
research
07/19/2022

IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge

As the importance of intrusion detection and prevention systems (IDPSs) ...

Please sign up or login with your details

Forgot password? Click here to reset