Automatic network intrusion detection: Current techniques and open issues

https://doi.org/10.1016/j.compeleceng.2012.05.013Get rights and content

Abstract

Automatic network intrusion detection has been an important research topic for the last 20 years. In that time, approaches based on signatures describing intrusive behavior have become the de-facto industry standard. Alternatively, other novel techniques have been used for improving automation of the intrusion detection process. In this regard, statistical methods, machine learning and data mining techniques have been proposed arguing higher automation capabilities than signature-based approaches. However, the majority of these novel techniques have never been deployed on real-life scenarios. The fact is that signature-based still is the most widely used strategy for automatic intrusion detection. In the present article we survey the most relevant works in the field of automatic network intrusion detection. In contrast to previous surveys, our analysis considers several features required for truly deploying each one of the reviewed approaches. This wider perspective can help us to identify the possible causes behind the lack of acceptance of novel techniques by network security experts.

Highlights

► This document reviews the most relevant techniques applied to intrusion detection. ► Techniques aim at providing better detection capabilities in a more automatic way. ► Those techniques claiming high accuracy are not easily deployable in real life. ► The assumptions in which these techniques rely on still need a lot of expert work. ► Efforts should be directed to reduce the need of human interaction in the process.

Introduction

A network intrusion detection system (NIDS) is the software tool that automates the network intrusion detection process. From an architectural point of view a NIDS can be analyzed from several angles (i.e. traffic capture process, system location, appropriate measures selection, among others). However, from a more simplified point of view, intrusion detection can be seen just as a classification problem in which a given network traffic event is assigned as normal or intrusive.

In the past 20 years, several techniques have been proposed to address the embedded classification problem inside NIDS. Perhaps the most successful approach has been the one based on pattern signatures describing known attacks behavior [1]. Under this approach, a malicious event is detected when some monitored event matches against a signature pattern. Despite signature-based NIDS are considered the de facto standard, they face the problem of needing a new set of signature patterns each time a new attack emerges. In addition, signatures describing such attacks have to be written by experts, which are not always available. In other words, the signature-based approach has failed in providing the level of automation required by security staff members.

Alternatively, techniques including statistical methods, machine learning and data mining methods have been proposed as a way of dealing with some of the issues regarding signature based-approaches. Such techniques aim at facilitating the work of the network security staff, providing a higher automation in the intrusion detection process along with good detection capabilities. Despite the success in obtaining high accuracy levels, most of these techniques have actually not been deployed in real-life scenarios. This situation suggests that accuracy is not the only goal in the pursuit of automatic intrusion detection.

The present work reviews the most relevant network intrusion detection techniques for wired networks, putting special emphasis on the embedded classification problem. However, in opposition to previous surveys on this field, analysis is performed considering not only accuracy results but also other features required for implementing the discussed techniques in real-life scenarios.

The rest of this work is organized as follows: Section 2 provides background information about the intrusion detection problem, including attack definitions, a taxonomy and a simplified NIDS architecture. Then, in Section 3, the most relevant approaches applied to intrusion detection are reviewed and compared based on the taxonomy along with common measures related to NIDS. Section 4 remarks the remaining open issues, which aim to explain why all except the signature-based approach are not being deployed on current networks. Finally, concluding remarks are provided in Section 5.

Section snippets

Background

Before discussing the most relevant approaches to NIDS, we proceed to describe the fundamental elements inside the intrusion detection problem.

Intrusion detection approaches

Because of the large number of works presented during the past years for both misuse and anomaly detection, it is convenient to group them according to the techniques used by each one of them. In this sense, we rely on the categorization proposed by Patcha and Park [5] and Lazarevic et al. [3].

Remaining open issues

The majority of the previously discussed works focus on the classification problem behind intrusion detection. If we considered the extremely precise results obtained by some approaches, we would say that the detection problem is near to be solved. Then, we should ask why none beyond pattern signature-based approach it is currently being used by network administrators. The fact is that previously analyzed works only cope with a subset of the problems that are essential to truly achieving

Conclusions

Several approaches have been proposed during the last 20 years of research in the intrusion detection field. All of these approaches aimed to facilitate the work of the network security staff providing some level of automation in the intrusion detection process. Certainly, such task cannot be considered easy since the non-stationary behavior of network traffic along with the permanent growth of the network throughput.

Nowadays, NIDS most successful approaches are those based on pattern signatures

Carlos Catania received the BS degree in information systems from Universidad Champagnat, Argentina, in 2004 and the M.Sc. degree in networking from Universidad de Mendoza, Argentina in 2007. He is presently pursuing the PhD degree in computer sciences at UNICEN, Tandil, Argentina. His research interests include Internet security and distributed computing systems.

References (72)

  • P. Garcia-Teodoro et al.

    Anomaly-based network intrusion detection: techniques, systems and challenges

    Comput Secur

    (2009)
  • R.P. Lippmann et al.

    Improving intrusion detection performance using keyword selection and neural networks

    Comput Netw

    (2000)
  • R. Lippmann et al.

    The 1999 darpa off-line intrusion detection evaluation

    Comput Netw

    (2000)
  • D. Zagar et al.

    Security aspects in ipv6 networks – implementation and testing

    Comput Electr Eng

    (2007)
  • A. Shiravi et al.

    Toward developing a systematic approach to generate benchmark datasets for intrusion detection

    Comput Secur

    (2012)
  • M. Roesch

    SNORT – lightweight intrusion detection for networks

  • Kendall K. A database of computer attacks for the evaluation of intrusion detection systems. Master’s thesis,...
  • A. Lazarevic et al.

    Intrusion detection: a survey

  • B. Mukherjee et al.

    Network intrusion detection

    Netw IEEE

    (1994)
  • Lindqvist U, Porras P. Detecting computer and network misuse through the production-based expert system toolset...
  • Porras PA, Neumann PG. EMERALD: event monitoring enabling responses to anomalous live disturbances. In: Proceedings of...
  • W. Lee et al.

    Data mining approaches for intrusion detection

  • Cannady J. Artificial neural networks for misuse detection. In: National information systems security conference,...
  • P.A.R. Kumar et al.

    Distributed denial of service attack detection using an ensemble of neural classifier

    Comput Commun

    (2011)
  • I. Ahmad et al.

    Artificial neural network approaches to intrusion detection: a review

  • Q. Xu et al.

    An intrusion detection approach based on understandable neural network trees

    Int J Comput Sci Netw Secur

    (2006)
  • A. Abraham et al.

    Evolving intrusion detection systems

  • Li W. Using genetic algorithm for network intrusion detection. In: Proceedings of the United States department of...
  • Gong RH, Zulkernine M, Abolmaesumi P. A software implementation of a genetic algorithm based approach to network...
  • Vollmer T, Alves-Foss J, Manic M. Autonomous rule creation for intrusion detection. In: IEEE Symposium on computational...
  • J. Gomez et al.

    Evolving fuzzy classifiers for intrusion detection

  • Bridges S, Vaughn R. Fuzzy data mining and genetic algorithms applied to intrusion detection. In: Proceedings of the...
  • Chen C, Mabu S, Yue C, Shimada K, Hirasawa K. Analysis of fuzzy class association rule mining based on genetic network...
  • Luo J. Integrating fuzzy logic with data mining methods for intrusion detection. Master’s thesis, Department of...
  • Florez G, Bridges S, Vaughn R. An improved algorithm for fuzzy data mining for intrusion detection. In: Fuzzy...
  • Ye N, Li X, Emran S. Decision tree for signature recognition and state classification. In: Proceedings of IEEE systems,...
  • Cited by (103)

    • Datasets are not enough: Challenges in labeling network traffic

      2022, Computers and Security
      Citation Excerpt :

      The fact is that much of the analysis and labeling of network traffic is still performed manually: with an expert user observing the network traces (Díaz-Verdejo et al., 2020; Huang et al., 2020). As mentioned by Catania and Garino (2012), Sommer and Paxson (2010), such a situation could be a definite obstacle for the massive adoption of SNIDS in the network security field. The present document provides an extensive review of the works presenting methodological strategies for generating accurate and representative labels for network security datasets.

    • Human-guided auto-labeling for network traffic data: The GELM approach

      2022, Neural Networks
      Citation Excerpt :

      More recent works combine a visualization component with the AL labeling strategy (Beaugnon et al., 2017; Fan, Li, Yuan, Dong, & Liang, 2019; Yang, Ma, Nie, Chang, & Hauptmann, 2015). Other techniques considering handling and labeling real network traffic are visualization (Guerra, Veas, & Catania, 2019; Torres, Catania, & Veas, 2019), statistical learning (Sharafaldin et al., 2018), and machine learning techniques (Banerjee et al., 2020; Buchanan et al., 2021; Buczak & Guven, 2016; Catania & Garino, 2012; Zhang et al., 2020). However, the effect of such methods on the labeling process is still unclear.

    • Robust adaptive multivariate Hotelling's T<sup>2</sup> control chart based on kernel density estimation for intrusion detection system

      2020, Expert Systems with Applications
      Citation Excerpt :

      In contrast to other approaches, the SPC has the advantage which does not require knowledge of the attack that never happened before. Also, SDI-based SPC can guarantee the attack detection process in real time (Catania & Garino, 2012). A multivariate Control chart is one of the SPC methods that has been widely utilized in network intrusion detection.

    • Flow-based network traffic generation using Generative Adversarial Networks

      2019, Computers and Security
      Citation Excerpt :

      Recently, Buczak and Guven (2016) presented an overview of the community effort with regard to this issue. However, there are still open challenges (e.g., the high cost of false-positives or the lack of labeled data sets which are publicly available) for the successful use of data mining algorithms for anomaly-based intrusion detection (Catania and Garino, 2012; Sommer and Paxson, 2010). In this work, we focus on a specific challenge within that setting.

    • Intrusion Detection System Using Machine Learning

      2024, Lecture Notes in Networks and Systems
    View all citing articles on Scopus

    Carlos Catania received the BS degree in information systems from Universidad Champagnat, Argentina, in 2004 and the M.Sc. degree in networking from Universidad de Mendoza, Argentina in 2007. He is presently pursuing the PhD degree in computer sciences at UNICEN, Tandil, Argentina. His research interests include Internet security and distributed computing systems.

    Carlos Garcia Garino graduated in engineering at University of Buenos Aires in 1978 and received a Ph.D. degree from UPC, Barcelona, Spain in 1993. Currently he is Full Professor at the School of Engineering and Head of the ITIC Research Institute of UNCuyo, Argentina. His research interests include Computational Mechanics, Computer Networks, and Distributed Computing. He has more than 50 papers published in scientific journals and proceedings of international conferences.

    Reviews processed and proposed for publication to Editor-in-Chief by Guest Editor Dr. Gregorio Martinez.

    View full text