Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection

Yuxin Meng, Lam-For Kwok

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

16 Citations (Scopus)

Abstract

By using string matching, signature-based network intrusion detection systems (NIDSs) can achieve a higher accuracy and lower false alarm rate than the anomaly-based systems. But the matching process is very expensive regarding to the performance of a signature-based NIDS in which the cost is at least linear to the size of the input string and the CPU occupancy rate can reach more than 80 percent in the worst case. This problem greatly limits the high performance of a signature-based NIDS in a large operational network. In this paper, we present a context-aware packet filter scheme aiming to mitigate this problem. In particular, our scheme incorporates a list technique, namely the blacklist to help filter network packets based on the confidence of the IP domains. Moreover, our scheme will adapt and update the blacklist contents by using the method of statistic-based blacklist generation according to the actual network environment. In the experiment, we implemented our scheme and showed the first experimental evaluation of its effectiveness. © 2011 IEEE.
Original languageEnglish
Title of host publicationProceedings of the 2011 7th International Conference on Information Assurance and Security, IAS 2011
Pages74-79
DOIs
Publication statusPublished - 2011
Event2011 7th International Conference on Information Assurance and Security, IAS 2011 - Malacca, Malaysia
Duration: 5 Dec 20118 Dec 2011

Conference

Conference2011 7th International Conference on Information Assurance and Security, IAS 2011
Country/TerritoryMalaysia
CityMalacca
Period5/12/118/12/11

Research Keywords

  • blacklist
  • intrusion detection
  • network packet filter

Fingerprint

Dive into the research topics of 'Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection'. Together they form a unique fingerprint.

Cite this