Internet Sieve: An Architecture for Generating Resilient Signatures
| dc.contributor.author | Yegneswaran, Vinod | en_US |
| dc.contributor.author | Giffin, Jonathon | en_US |
| dc.contributor.author | Barford, Paul | en_US |
| dc.contributor.author | Jha, Somesh | en_US |
| dc.date.accessioned | 2012-03-15T17:18:18Z | |
| dc.date.available | 2012-03-15T17:18:18Z | |
| dc.date.created | 2004 | en_US |
| dc.date.issued | 2004 | en_US |
| dc.description.abstract | We present iSieve, a modular architecture for identifying intrusion profiles in packet trace data and automatically constructing resilient signatures for the profiles. The first component of the architecture organizes and normalizes packet trace data collected from honeynets. The second component classifies this data into attack profiles based upon data similarity measures. The final component uses machine learning methods to generate an automaton for each attack profile. These automata can then be used as signatures by network intrusion detection systems. We show how a large, diverse data set is effectively summarized by each component of our system and use these results to highlight implementation considerations in the architecture. Evaluation demonstrates Sieve's ability to generate resilient signatures for many different intrusion profiles. For example, our learned signatures detect 99.98% of the intrusive sessions in NetBIOS data and generate no false alarms. | en_US |
| dc.format.mimetype | application/pdf | en_US |
| dc.identifier.citation | TR1507 | en_US |
| dc.identifier.uri | http://digital.library.wisc.edu/1793/60402 | |
| dc.publisher | University of Wisconsin-Madison Department of Computer Sciences | en_US |
| dc.title | Internet Sieve: An Architecture for Generating Resilient Signatures | en_US |
| dc.type | Technical Report | en_US |
Files
Original bundle
1 - 1 of 1