Skip to main content

Automatic Classification and Detection of Snort Configuration Anomalies - a Formal Approach

  • Conference paper
  • First Online:
Book cover International Joint Conference (CISIS 2015)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 369))

Abstract

IDSs are core elements in network security. The effectiveness of security protection provided by an IDS mainly depends on the quality of its configuration. Unfortunately, configuring an IDS is work-intensive and error prone if performed manually. As a result, there is a high demand for analyzing and discovering automatically anomalies that can arise between rules. In this paper, we present (1) a new classification of anomalies between IDS rules, (2) three inference systems allowing automatic anomaly detection for discovering rule conflicts or redundancies and potential problems in IDS configuration, (3) optimization of IDS rules by removing automatically redundant rules and (4) formal specification and validation of these techniques and demonstration of the advantages of proposed approach on the sets of rules provided by open source Snort IDS. These techniques have been implemented and we proved the correctness of our method and demonstrated its applicability and scalability. The first results we obtained are very promising.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Information security breaches survey. Available from http://www.pwc.co.uk/assets/pdf/cyber-security-2013-technical-report.pdf (2013)

  2. Snort Users Manual 2.9.3. Available from https://www.snort.org/documents (2014)

  3. Emerging Threats.net Open rulesets. Available from http://rules.emergingthreats.net (2015)

  4. Al-Shaer, E.S., Hamed, H.H.: Modeling and management of firewall policies. IEEE Trans. Netw. Serv. Manage. 1(1), 2–10 (2004)

    Google Scholar 

  5. Blanc, M., Briffaut, J., Clemente, P., El Rab, M.G., Toinard, C.: A collaborative approach for access control, intrusion detection and security testing, pp. 270–277 (2006)

    Google Scholar 

  6. Chomsiri, T., Pornavalai, C.: Firewall rules analysis, pp. 213–219 (2006)

    Google Scholar 

  7. Colville, R.J., Spafford, G.: Gartner ras core resarch note g00208328 (2010)

    Google Scholar 

  8. Cuppens, F., Cuppens-Boulahia, N., Garcia-Alfaro, J.: Detection and removal of firewall misconfiguration (2005)

    Google Scholar 

  9. Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N.: Analysis of policy anomalies on distributed network security setups, pp. 496–511 (2006)

    Google Scholar 

  10. Hu, H., Ahn, G.-J., Ketan, K.: Detecting and resolving firewall policy anomalies. IEEE Trans. Dependable Secure Comput. 9(3), 318–331 (2012)

    Google Scholar 

  11. Mukkapati, N., Bhargavi, Ch.V.: Detecting policy anomalies in firewalls by relational algebra and raining 2d-box model. IJCSNS Int. J. Comput. Sci. Network Secur. 13(5), 94–99 (2013)

    Google Scholar 

  12. Stakhanova, N., Li, Y., Ghorbani, A.A.: Classification and discovery of rule misconfigurations in intrusion detection and response devices, pp. 29–37 (2009)

    Google Scholar 

  13. Uribe, T.E., Cheung, S.: Automatic analysis of firewall and network intrusion detection system configurations. In: Technical report, SRI international 9 (2004)

    Google Scholar 

  14. Zhang, D.: Inconsistencies in information security and digital forensics, pp. 141–146 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amina Saâdaoui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Saâdaoui, A., Benmoussa, H., Bouhoula, A., Kalam, A.A.E. (2015). Automatic Classification and Detection of Snort Configuration Anomalies - a Formal Approach. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19713-5_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19712-8

  • Online ISBN: 978-3-319-19713-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics