Identification of Flaws in the Design of Signatures for Intrusion Detection Systems

05/28/2018
by   Nancy Agarwal, et al.
0

Signature-based Intrusion Detection System (SIDS) provides a promising solution to the problem of web application security. However, the performance of the system highly relies on the quality of the signatures designed to detect attacks. A weak signature set may considerably cause an increase in false alarm rate, making impractical to deploy the system. The objective of the paper is to identify the flaws in the signature structure which are responsible to reduce the efficiency of the detection system. The paper targets SQL injection signatures particularly. Initially, some essential concepts of the domain of the attack that should be focused by the developer in prior to designing the signatures have been discussed. Afterwards, we conducted a case study on the well known PHPIDS tool for analyzing the quality of its SQL signatures. Based on the analysis, we identify various flaws in the designing practice that yield inefficient signatures. We divide the weak signatures into six categories, namely incomplete, irrelevant, semi-relevant, susceptible, redundant and inconsistent signatures. Moreover, we quantify these weaknesses and define them mathematically in terms of set theory. To the best of our knowledge, we have identified some novel signature design issues. The paper will basically assist the signature developer to know what level of expertise is required for devising a quality signature set and how a little ignorance may lead to deterioration in the performance of the SIDS. Furthermore, a security expert may evaluate the detector against the identified flaws by conducting structural analysis on its signature set.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/01/2020

Efficient Wu-Manber Pattern Matching Hardware for Intrusion and Malware Detection

Network intrusion detection systems and antivirus software are essential...
research
07/19/2022

IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge

As the importance of intrusion detection and prevention systems (IDPSs) ...
research
03/05/2010

Integrating Innate and Adaptive Immunity for Intrusion Detection

Network Intrusion Detection Systems (NDIS) monitor a network with the ai...
research
10/16/2009

An Immune Inspired Network Intrusion Detection System Utilising Correlation Context

Network Intrusion Detection Systems (NIDS) are computer systems which mo...
research
07/09/2018

Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems

Security of information passing through the Internet is threatened by to...
research
12/17/2020

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

In this paper, we present a study that proposes a three-stage classifier...
research
03/16/2018

A closer look on Intrusion Detection System for web applications

Intrusion Detection System (IDS) is one of the security measures being u...

Please sign up or login with your details

Forgot password? Click here to reset