Building intrusion pattern miner for Snort network intrusion detection system

  • Authors:
  • Lih-Chyau Wuu;Chi-Hsiang Hung;Sout-Fong Chen

  • Affiliations:
  • Department of Electronic Engineering, National Yunlin University of Science and Technology, 123, University Road Section 3, Touliu, Yunlin, Taiwan, ROC;Department of Electronic Engineering, National Yunlin University of Science and Technology, 123, University Road Section 3, Touliu, Yunlin, Taiwan, ROC;Department of Electronic Engineering, National Yunlin University of Science and Technology, 123, University Road Section 3, Touliu, Yunlin, Taiwan, ROC

  • Venue:
  • Journal of Systems and Software
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we enhance the functionalities of Snort network-based intrusion detection system to automatically generate patterns of misuse from attack data, and the ability of detecting sequential intrusion behaviors. To that, we implement an intrusion pattern discovery module which applies data mining technique to extract single intrusion patterns and sequential intrusion patterns from a collection of attack packets, and then converts the patterns to Snort detection rules for on-line intrusion detection. In order to detect sequential intrusion behavior, the Snort detection engine is accompanied with our intrusion behavior detection engine. Intrusion behavior detection engine will create an alert when a series of incoming packets match the signatures representing sequential intrusion scenarios.