Protecting Run-Time Filters for Network Intrusion Detection Systems

Victor C. Valgenti, Hai Sun, Min Sik Kim
{"title":"Protecting Run-Time Filters for Network Intrusion Detection Systems","authors":"Victor C. Valgenti, Hai Sun, Min Sik Kim","doi":"10.1109/AINA.2014.19","DOIUrl":null,"url":null,"abstract":"Network Intrusion Detection Systems (NIDS) examine millions of network packets searching for malicious traffic. Multi-gigabit line-speeds combined with growing databases of rules lead to dropped packets as the load exceeds the capacity of the device. Several areas of research have attempted to mitigate this problem through improving packet inspection efficiency, increasing resources, or reducing the examined population. A popular method for reducing the population examined is to employ run-time filters that can provide a quick check to determine that a given network packet cannot match a particular rule set. While this technique is an excellent method for reducing the population under examination, rogue elements can trivially bypass such filters with specially crafted packets and render the run-time filters effectively useless. Since the filtering comes at the cost of extra processing a filtering solution could actually perform worse than a non-filtered solution under such pandemic circumstances. To defend against such attacks, it is necessary to consider run-time filters as an independent anomaly detector capable of detecting attacks against itself. Such anomaly detection, together with judicious rate-limiting of traffic forwarded to full packet inspection, allows the detection, logging, and mitigation of attacks targeted at the filters while maintaining the overall improvements in NIDS performance garnered from using run-time filters.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"166 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2014.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Network Intrusion Detection Systems (NIDS) examine millions of network packets searching for malicious traffic. Multi-gigabit line-speeds combined with growing databases of rules lead to dropped packets as the load exceeds the capacity of the device. Several areas of research have attempted to mitigate this problem through improving packet inspection efficiency, increasing resources, or reducing the examined population. A popular method for reducing the population examined is to employ run-time filters that can provide a quick check to determine that a given network packet cannot match a particular rule set. While this technique is an excellent method for reducing the population under examination, rogue elements can trivially bypass such filters with specially crafted packets and render the run-time filters effectively useless. Since the filtering comes at the cost of extra processing a filtering solution could actually perform worse than a non-filtered solution under such pandemic circumstances. To defend against such attacks, it is necessary to consider run-time filters as an independent anomaly detector capable of detecting attacks against itself. Such anomaly detection, together with judicious rate-limiting of traffic forwarded to full packet inspection, allows the detection, logging, and mitigation of attacks targeted at the filters while maintaining the overall improvements in NIDS performance garnered from using run-time filters.
保护网络入侵检测系统的运行时过滤器
网络入侵检测系统(NIDS)检测数以百万计的网络数据包,寻找恶意流量。千兆位的线路速度加上不断增长的规则数据库,在负载超过设备容量时导致数据包丢失。一些领域的研究试图通过提高包检测效率、增加资源或减少被检测的数量来缓解这个问题。减少检查数量的一种流行方法是使用运行时过滤器,它可以提供快速检查,以确定给定的网络数据包是否与特定规则集不匹配。虽然这种技术是减少被检查对象数量的极好方法,但是恶意元素可以使用特制的数据包轻松绕过这些过滤器,并使运行时过滤器实际上毫无用处。由于过滤是以额外处理为代价的,因此在这种大流行的情况下,过滤解决方案实际上可能比未过滤的解决方案表现更差。为了防御此类攻击,有必要将运行时过滤器视为能够检测针对自身的攻击的独立异常检测器。这种异常检测,加上对转发到完整数据包检查的流量进行明智的速率限制,允许检测、记录和缓解针对过滤器的攻击,同时保持使用运行时过滤器获得的NIDS性能的总体改进。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信