D. Raharjo, Ade Nurmala, Ricko Dwi Pambudi, R. F. Sari
{"title":"Performance Evaluation of Intrusion Detection System Performance for Traffic Anomaly Detection Based on Active IP Reputation Rules","authors":"D. Raharjo, Ade Nurmala, Ricko Dwi Pambudi, R. F. Sari","doi":"10.1109/IConEEI55709.2022.9972298","DOIUrl":null,"url":null,"abstract":"As a signature-based Intrusion Detection System (IDS), Suricata conducts data inspections based on rules to provide warnings from data traffic that meets the criteria of the rules. It means that the more complex the rules, the more comprehensive Suricata should be in detecting anomalies in data traffic. This study aims to analyze the influence of the number of rules on IDS performance in detecting anomalies in data traffic, focusing on Internet Protocol (IP) reputation rules in Suricata. The author will generate a multi-IP communication simulation using network simulator NS3. The NS3 results in packet capture (pcap) file will be used as the Suricata test dataset to calculate the percentage of packet drops and the percentage of rules detected. That pcap is replayed using the TcpReplay application while Suricata performs packet data inspections. This paper shows that the number of activated rules has a linear effect on Suricata’s performance in the detecting process. The performance of Suricata, measured in terms of the percentage of rules detected, dropped by approximately 14% when detecting 10,000 IP reputation rules in scenario 1, and it continued to drop significantly, reaching only 16.24% when the number of IP Reputation Rules reached 1 million IP lists in scenario 2.","PeriodicalId":382763,"journal":{"name":"2022 3rd International Conference on Electrical Engineering and Informatics (ICon EEI)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 3rd International Conference on Electrical Engineering and Informatics (ICon EEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IConEEI55709.2022.9972298","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
As a signature-based Intrusion Detection System (IDS), Suricata conducts data inspections based on rules to provide warnings from data traffic that meets the criteria of the rules. It means that the more complex the rules, the more comprehensive Suricata should be in detecting anomalies in data traffic. This study aims to analyze the influence of the number of rules on IDS performance in detecting anomalies in data traffic, focusing on Internet Protocol (IP) reputation rules in Suricata. The author will generate a multi-IP communication simulation using network simulator NS3. The NS3 results in packet capture (pcap) file will be used as the Suricata test dataset to calculate the percentage of packet drops and the percentage of rules detected. That pcap is replayed using the TcpReplay application while Suricata performs packet data inspections. This paper shows that the number of activated rules has a linear effect on Suricata’s performance in the detecting process. The performance of Suricata, measured in terms of the percentage of rules detected, dropped by approximately 14% when detecting 10,000 IP reputation rules in scenario 1, and it continued to drop significantly, reaching only 16.24% when the number of IP Reputation Rules reached 1 million IP lists in scenario 2.