Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems

  • Authors:
  • Martin Rehák;Eugen Staab;Volker Fusenig;Michal Pěchouček;Martin Grill;Jan Stiborek;Karel Bartoš;Thomas Engel

  • Affiliations:
  • Department of Cybernetics, Czech Technical University, Prague;Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg;Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg;Department of Cybernetics, Czech Technical University, Prague;CESNET, z. s. p. o., Prague, Czech Republic and Department of Cybernetics, Czech Technical University, Prague;Department of Cybernetics, Czech Technical University, Prague;CESNET, z. s. p. o., Prague, Czech Republic and Department of Cybernetics, Czech Technical University, Prague;Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg

  • Venue:
  • RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Our work proposes a generic architecture for runtime monitoring and optimization of IDS based on the challenge insertion. The challenges, known instances of malicious or legitimate behavior, are inserted into the network traffic represented by NetFlow records, processed with the current traffic and the system's response to the challenges is used to determine its effectiveness and to fine-tune its parameters. The insertion of challenges is based on the threat models expressed as attack trees with attached risk/loss values. The use of threat model allows the system to measure the expected undetected loss and to improve its performance with respect to the relevant threats, as we have verified in the experiments performed on live network traffic.