Rule Generalisation in Intrusion Detection Systems using Snort

Aickelin, Uwe, Twycross, Jamie and Hesketh-Roberts, Thomas (2007) Rule Generalisation in Intrusion Detection Systems using Snort. International Journal of Electronic Security and Digital Forensics, 1 (1). pp. 101-116.

This is the latest version of this item.

Full text not available from this repository.


Intrusion Detection Systems (IDSs) provide an important

layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and

show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing.

Keywords: anomaly detection, intrusion detection, Snort, Snort rules

Item Type: Article
Additional Information: (c) Inderscience 2007
Schools/Departments: University of Nottingham, UK > Faculty of Science > School of Computer Science
Identification Number:
Depositing User: Aickelin, Professor Uwe
Date Deposited: 26 Oct 2007 10:58
Last Modified: 04 May 2020 20:28

Available Versions of this Item

Actions (Archive Staff Only)

Edit View Edit View