2006
DOI: 10.1007/11856214_14
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Network Intrusion Detection with Integrated Sampling and Filtering

Abstract: The structure of many standalone network intrusion detection systems (NIDSs) centers around a chain of analysis that begins with packets captured by a packet filter, where the filter describes the protocols (TCP/UDP port numbers) and sometimes hosts or subnets to include or exclude from the analysis. In this work we argue for augmenting such analysis with an additional, separately filtered stream of packets. This "Secondary Path" supplements the "Main Path" by integrating sampling and richer forms of filtering… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 18 publications
0
14
0
Order By: Relevance
“…RELATED WORK Snort [9] and Bro [8], [3], [5], [10], [2] are two of the more popular public domain Network Intrusion Detection Systems (NIDSs). The current implementation of Snort uses the optimized version of the AC automaton [1].…”
Section: Resultsmentioning
confidence: 99%
“…RELATED WORK Snort [9] and Bro [8], [3], [5], [10], [2] are two of the more popular public domain Network Intrusion Detection Systems (NIDSs). The current implementation of Snort uses the optimized version of the AC automaton [1].…”
Section: Resultsmentioning
confidence: 99%
“…However, decryption times are typically small and only a small portion of the packet will be decrypted using Two-Key IPsec. Further, there is ongoing research [6,7,15,16] to improve the performance of NIDSs and deal with growing traffic rates.…”
Section: Discussionmentioning
confidence: 99%
“…The authors then use this technique to create a behavioral pattern, which can be used to block potential ''exploit traffic'' (Xu et al, 2005a, b) by constructing appropriate Access Control Lists for routers. Gonzalez and Paxson (2006), also inspired by AutoFocus, proposed packet level random sampling to detect heavy-hitters in network traffic. It has been observed (Duffield et al, 2001;Feldmann et al, 2001) that a small number of heavy flows account for a large amount of traffic.…”
Section: Desired Characteristics Of Our Sampling Algorithmmentioning
confidence: 99%