首页> 外文会议>Annual Hawaii International Conference on System Sciences >Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
【24h】

Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?

机译:零日攻击的基于签名的入侵检测:(不)封闭章节?

获取原文

摘要

A frequent claim that has not been validated is that signature based network intrusion detection systems (SNIDS) cannot detect zero-day attacks. This paper studies this property by testing 356 severe attacks on the SNIDS Snort, configured with an old official rule set. Of these attacks, 183 attacks are zero-days' to the rule set and 173 attacks are theoretically known to it. The results from the study show that Snort clearly is able to detect zero-days' (a mean of 17% detection). The detection rate is however on overall greater for theoretically known attacks (a mean of 54% detection). The paper then investigates how the zero-days' are detected, how prone the corresponding signatures are to false alarms, and how easily they can be evaded. Analyses of these aspects suggest that a conservative estimate on zero-day detection by Snort is 8.2%.
机译:尚未得到证实的一个常见说法是基于签名的网络入侵检测系统(SNIDS)无法检测到零时差攻击。本文通过测试对SNIDS Snort的356次严重攻击(使用旧的官方规则集进行配置)来研究此属性。在这些攻击中,有183次攻击是规则集的零天,而从理论上讲,有173次攻击是该规则集的零日。该研究的结果表明,Snort显然能够检测到零天(平均检测率为17%)。但是,对于理论上已知的攻击,检测率总体上更高(平均检测率为54%)。然后,论文研究了如何检测到零时差,相应的签名如何容易发生虚假警报以及如何容易地逃避。这些方面的分析表明,Snort对零日检测的保守估计为8.2%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号