94
IRUS Total
Downloads
  Altmetric

Detecting distributed signature-based intrusion: The case of multi-path routing attacks

File Description SizeFormat 
infocomm15.pdfAccepted version732.43 kBAdobe PDFView/Open
Title: Detecting distributed signature-based intrusion: The case of multi-path routing attacks
Authors: Ma, J
Le, F
Russo, AM
Lobo, J
Item Type: Conference Paper
Abstract: Signature-based network intrusion detection systems (S-IDS) have become an important security tool in the protection of an organisation’s infrastructure against external intruders. By analysing network traffic, S-IDS’ detect network intrusions. An organisation may deploy one or multiple S-IDS’, each working independently with the assumption that it can monitor all packets of a given flow to detect intrusion signatures. However, emerging technologies (e.g., Multi-Path TCP) violate this assumption, as traffic can be concurrently sent across different paths (e.g., WiFi, Cellular) to boost network performance. Attackers may exploit this capability and split malicious payloads across multiple paths to evade traditional signaturebased network intrusion detection systems. Although multiple monitors may be deployed, none of them has the full coverage of the network traffic to detect the intrusion signature. In this paper, we formalise this distributed signature-based intrusion detection problem as an asynchronous online exact string matching problem, and propose an algorithm for it. To demonstrate its effectiveness we conducted comprehensive experiments. Our results show that the behaviour of our algorithm depends only on the packet arrival rate: delay in detecting the signature grows linearly with respect to the packet arrival rate and with small communication overhead.
Issue Date: 24-Aug-2015
Date of Acceptance: 16-Nov-2014
URI: http://hdl.handle.net/10044/1/23800
DOI: 10.1109/INFOCOM.2015.7218423
ISBN: 978-1-4799-8381-0
Publisher: IEEE
Start Page: 558
End Page: 566
Journal / Book Title: Proceedings IEEE INFOCOM 2015
Copyright Statement: © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Sponsor/Funder: IBM United Kingdom Ltd
Funder's Grant Number: PO 4602911792
Conference Name: IEEE INFOCOM '15
Keywords: Science & Technology
Technology
Computer Science, Theory & Methods
Engineering, Electrical & Electronic
Telecommunications
Computer Science
Engineering
SYSTEM
Publication Status: Published
Start Date: 2015-04-26
Finish Date: 2015-05-01
Conference Place: Hong Kong
Appears in Collections:Computing
Faculty of Engineering