A framework for improving the performance of signature-based network intrusion detection systems

  • Weizhi MENG

Student thesis: Doctoral Thesis

Abstract

Network Intrusion detection systems (NIDSs) have been widely deployed in different network environments (e.g., banks, schools) to defend against a variety of network attacks (e.g., Trojans, worms). Generally, a network intrusion detection system can be classified into two categories: signature-based NIDS and anomaly-based NIDS. In real-world applications, the signature-based NIDS is more prevalent than anomalybased detection as the false alarm rate of the former is much lower than the latter. However, we identify three major issues that can greatly affect the performance of a signature-based NIDS. • Expensive signature matching. The traditional signature matching in a signature-based NIDS is too expensive such that the computing burden is at least linear to the size of an incoming string. Therefore, the operational burden of a signature-based NIDS can be significantly increased in a largescale network environment. • Overhead network packets. In a large-scale network environment, a signaturebased NIDS usually has to drop lots of network packets since the number of incoming packets exceeds its maximum processing capability. • Massive false alarms. Although the false alarm rate of a signature-based NIDS is much smaller than that of an anomaly-based NIDS, the number of false alarms generated by a signature-based NIDS can still increase the difficulty in analysing true alarms and adversely affect the analysis results. To mitigate the above issues, in this thesis, we accordingly propose several approaches and a framework to improve the performance of a signature-based NIDS such as Snort as follows: • Signature matching improvement. We design an exclusive signature matching scheme to help perform more efficient signature matching with the purpose of enhancing the performance of signature matching in a heavy traffic environment. • Network packet filtration and reduction. To mitigate this issue, we advocate the method of constructing a packet filter such as blacklist-based packet filter, list-based packet filter and trust-based packet filter to help filter out target network packets for a signature-based NIDS such as Snort in terms of IP reputation. This packet filter can be deployed in front of a signaturebased NIDS and reduce its workload in an intensive traffic network. • False alarm reduction. To resolve this issue, we design several false alarm filters such as machine-learning based false alarm filters, alarm filters using knowledge-based alert verification and context-based alarm filters to help reduce false alarms (or non-critical alarms) that are generated by a signaturebased NIDS. • A Framework. In addition, we further propose a framework, through combining the above work such as exclusive signature matching, packet filter and alarm filter, to overall improve the performance of a signature-based NIDS such as Snort. As a case study of the framework, we implement an enhanced filter mechanism (shortly EFM) that consists of three major components: a context-aware blacklistbased packet filter, an exclusive signature matching component and a KNN-based false alarm filter. In particular, the component of context-aware blacklist-based packet filter is responsible for filtering out network packets in terms of IP reputation. The exclusive signature matching component is implemented in the context-aware blacklist-based packet filter and aims to speed up signature matching. Finally, the component of KNN-based false alarm filter is responsible for filtering out false alarms which are produced by the context-aware blacklist-based packet filter and the NIDS. In the evaluation, the experimental results demonstrate that our framework is promising and by deploying with the EFM, the performance of a signature-based NIDS such as Snort can be improved in the aspects of network packet filtration, signature matching improvement and false alarm reduction.
Date of Award2 Oct 2013
Original languageEnglish
Awarding Institution
  • City University of Hong Kong
SupervisorLam For KWOK (Supervisor)

Keywords

  • Security measures
  • Computer networks

Cite this

'