Toward Automatic Generation of Intrusion Detection Verification Rules


An Intrusion Detection System (IDS) is a crucial element of a network security posture. One class of IDS, called signature-based network IDSs, monitors network traffic, looking for evidence of malicious behavior as specified in attack descriptions (referred to as signatures). Many studies have reported that IDSs can generate thousands of alarms a day, many of which are false alarms. The problem often lies in the low accuracy of IDS signatures. It is therefore important to have more accurate signatures in order to reduce the number of false alarms. One part of the false alarm problem is the inability of IDSs to verify attacks (i.e. distinguish between successful and failed attacks). If IDSs were able to accurately verify attacks, this would reduce the number of false alarms a network administrator has to investigate. In this paper, we demonstrate the feasibility of using a data mining algorithm to automatically generate IDS verification rules. We show that this automated approach is effective in reducing the number of false alarms when compared to other widely used and maintained IDSs.

DOI: 10.1109/ACSAC.2008.27

Extracted Key Phrases

8 Figures and Tables

Cite this paper

@article{Massicotte2008TowardAG, title={Toward Automatic Generation of Intrusion Detection Verification Rules}, author={Fr{\'e}d{\'e}ric Massicotte and Yvan Labiche and Lionel C. Briand}, journal={2008 Annual Computer Security Applications Conference (ACSAC)}, year={2008}, pages={279-288} }