Loading [MathJax]/extensions/MathMenu.js
An IDS Rule Redundancy Verification | IEEE Conference Publication | IEEE Xplore

An IDS Rule Redundancy Verification


Abstract:

Intrusion Detection System (IDS) is a network security software and hardware widely used to detect anomaly network traffics by comparing the traffics against rules specif...Show More

Abstract:

Intrusion Detection System (IDS) is a network security software and hardware widely used to detect anomaly network traffics by comparing the traffics against rules specified beforehand. Snort is one of the most famous open-source IDS system. To write a rule, Snort specifies structure and values in Snort manual. This specification is expressive enough to write in different way with the same meaning. If there are rule redundancy, it could distract performance. We, thus, propose a proof of semantical issues for Snort rule and found four pairs of Snort rule combinations that can cause redundancy. In addition, we create a tool to verify such redundancy between two rules on the public rulesets from Snort community and Emerging threat. As a result of our test, we found several redundancy issues in public rulesets if the user enables commented rules.
Date of Conference: 04-06 November 2020
Date Added to IEEE Xplore: 30 November 2020
ISBN Information:

ISSN Information:

Conference Location: Bangkok, Thailand

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.