[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1920261.1920279acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Network intrusion detection: dead or alive?

Published: 06 December 2010 Publication History

Abstract

Research on network intrusion detection has produced a number of interesting results. In this paper, I look back to the NetSTAT system, which was presented at ACSAC in 1998. In addition to describing the original system, I discuss some historical context, with reference to well-known evaluation efforts and to the evolution of network intrusion detection into a broader field that includes malware detection and the analysis of malicious behavior.

References

[1]
C. Berge. Hypergraphs. North-Holland, 1989.
[2]
S. Eckmann, G. Vigna, and R. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection. Journal of Computer Security, 10(1, 2):71--104, 2002.
[3]
L. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood, and D. Wolber. A Network Security Monitor. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 296--304, Oakland, CA, May 1990.
[4]
K. Ilgun, R. Kemmerer, and P. Porras. State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering, 21(3):181--199, March 1995.
[5]
W. Lee and S. Stolfo. Data Mining Approaches for Intrusion Detection. In Proceedings of the USENIX Security Symposium, San Antonio, TX, January 1998.
[6]
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunningham, and M. Zissman. Evaluating Intrustion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation. In Proceedings of the DARPA Information Survivability Conference and Exposition, Volume 2, Hilton Head, SC, January 2000.
[7]
R. Lippmann and J. Haines. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. In Proceedings of the Symposium on the Recent Advances in Intrusion Detection (RAID), pages 162--182, Toulouse, France, 2000.
[8]
S. McCanne and V. Jacobson. The BSD Packet Filter: A New Architecture for User-level Packet Capture. In Proceedings of the 1993 Winter USENIX Conference, San Diego, CA, January 1993.
[9]
S. McCanne, C. Leres, and V. Jacobson. Tcpdump 3.7. Documentation, 2002.
[10]
J. McHugh. Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transaction on Information and System Security, 3(4), November 2000.
[11]
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January 1998.
[12]
P. Porras. STAT -- A State Transition Analysis Tool for Intrusion Detection. Master's thesis, Computer Science Department, University of California, Santa Barbara, June 1992.
[13]
P. Porras and P. Neumann. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In Proceedings of the 1997 National Information Systems Security Conference, October 1997.
[14]
M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference, Seattle, WA, November 1999.
[15]
G. Vigna. A Topological Characterization of TCP/IP Security. In Proceedings of the 12th International Symposium of Formal Methods Europe (FME '03), number 2805 in LNCS, pages 914--940, Pisa, Italy, September 2003. Springer-Verlag.
[16]
G. Vigna and R. Kemmerer. NetSTAT: A Network-based Intrusion Detection Approach. In Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC '98), pages 25--34, Scottsdale, AZ, December 1998. IEEE Press.
[17]
G. Vigna, W. Robertson, and D. Balzarotti. Testing Network-based Intrusion Detection Signatures Using Mutant Exploits. In Proceedings of the ACM Conference on Computer and Communication Security (ACM CCS), pages 21--30, Washington, DC, October 2004.

Cited By

View all
  • (2023)Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS RulesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616581(2770-2784)Online publication date: 15-Nov-2023
  • (2022)Ruling the RulesProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security10.1145/3488932.3517412(799-814)Online publication date: 30-May-2022
  • (2017)Anomaly Detection as a Service: Challenges, Advances, and OpportunitiesSynthesis Lectures on Information Security, Privacy, and Trust10.2200/S00800ED1V01Y201709SPT0229:3(1-173)Online publication date: 24-Oct-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACSAC '10: Proceedings of the 26th Annual Computer Security Applications Conference
December 2010
419 pages
ISBN:9781450301336
DOI:10.1145/1920261
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • ACSA: Applied Computing Security Assoc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 December 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. intrusion detection
  2. network security

Qualifiers

  • Research-article

Conference

ACSAC '10
Sponsor:
  • ACSA

Acceptance Rates

Overall Acceptance Rate 104 of 497 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS RulesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616581(2770-2784)Online publication date: 15-Nov-2023
  • (2022)Ruling the RulesProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security10.1145/3488932.3517412(799-814)Online publication date: 30-May-2022
  • (2017)Anomaly Detection as a Service: Challenges, Advances, and OpportunitiesSynthesis Lectures on Information Security, Privacy, and Trust10.2200/S00800ED1V01Y201709SPT0229:3(1-173)Online publication date: 24-Oct-2017
  • (2014)Similarity as a central approach to flow-based anomaly detectionNetworks10.1002/nem.186724:4(318-336)Online publication date: 1-Jul-2014
  • (2013)Evaluation in the absence of absolute ground truthInternational Journal of Information Security10.1007/s10207-012-0178-112:2(97-110)Online publication date: 1-Apr-2013
  • (2012)A comprehensive semi-automated incident handling workflow6th International Symposium on Telecommunications (IST)10.1109/ISTEL.2012.6483144(1065-1070)Online publication date: Nov-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media