94
IRUS TotalDownloads
Altmetric
Detecting distributed signature-based intrusion: The case of multi-path routing attacks
File | Description | Size | Format | |
---|---|---|---|---|
infocomm15.pdf | Accepted version | 732.43 kB | Adobe PDF | View/Open |
Title: | Detecting distributed signature-based intrusion: The case of multi-path routing attacks |
Authors: | Ma, J Le, F Russo, AM Lobo, J |
Item Type: | Conference Paper |
Abstract: | Signature-based network intrusion detection systems (S-IDS) have become an important security tool in the protection of an organisation’s infrastructure against external intruders. By analysing network traffic, S-IDS’ detect network intrusions. An organisation may deploy one or multiple S-IDS’, each working independently with the assumption that it can monitor all packets of a given flow to detect intrusion signatures. However, emerging technologies (e.g., Multi-Path TCP) violate this assumption, as traffic can be concurrently sent across different paths (e.g., WiFi, Cellular) to boost network performance. Attackers may exploit this capability and split malicious payloads across multiple paths to evade traditional signaturebased network intrusion detection systems. Although multiple monitors may be deployed, none of them has the full coverage of the network traffic to detect the intrusion signature. In this paper, we formalise this distributed signature-based intrusion detection problem as an asynchronous online exact string matching problem, and propose an algorithm for it. To demonstrate its effectiveness we conducted comprehensive experiments. Our results show that the behaviour of our algorithm depends only on the packet arrival rate: delay in detecting the signature grows linearly with respect to the packet arrival rate and with small communication overhead. |
Issue Date: | 24-Aug-2015 |
Date of Acceptance: | 16-Nov-2014 |
URI: | http://hdl.handle.net/10044/1/23800 |
DOI: | 10.1109/INFOCOM.2015.7218423 |
ISBN: | 978-1-4799-8381-0 |
Publisher: | IEEE |
Start Page: | 558 |
End Page: | 566 |
Journal / Book Title: | Proceedings IEEE INFOCOM 2015 |
Copyright Statement: | © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Sponsor/Funder: | IBM United Kingdom Ltd |
Funder's Grant Number: | PO 4602911792 |
Conference Name: | IEEE INFOCOM '15 |
Keywords: | Science & Technology Technology Computer Science, Theory & Methods Engineering, Electrical & Electronic Telecommunications Computer Science Engineering SYSTEM |
Publication Status: | Published |
Start Date: | 2015-04-26 |
Finish Date: | 2015-05-01 |
Conference Place: | Hong Kong |
Appears in Collections: | Computing Faculty of Engineering |