Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ho, Cheng-Yuan | en_US |
dc.contributor.author | Lai, Yuan-Cheng | en_US |
dc.contributor.author | Chen, I-Wei | en_US |
dc.contributor.author | Wang, Fu-Yu | en_US |
dc.contributor.author | Tai, Wei-Hsuan | en_US |
dc.date.accessioned | 2014-12-08T15:21:53Z | - |
dc.date.available | 2014-12-08T15:21:53Z | - |
dc.date.issued | 2012-03-01 | en_US |
dc.identifier.issn | 0163-6804 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/MCOM.2012.6163595 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/15580 | - |
dc.description.abstract | False positives and false negatives happen to every intrusion detection and intrusion prevention system. This work proposes a mechanism for false positive/negative assessment with multiple IDSs/IPSs to collect FP and FN cases from real-world traffic and statistically analyze these cases. Over a period of 16 months, more than 2000 FPs and FNs have been collected and analyzed. From the statistical analysis results, we obtain three interesting findings. First, more than 92.85 percent of false cases are FPs even if the numbers of attack types for FP and FN are similar. That is mainly because the behavior of applications or the format of the application content is self-defined; that is, there is not complete conformance to the specifications of RFCs. Accordingly, when this application meets an IDS/IPS with strict detection rules, its traffic will be regarded as malicious traffic, resulting in a lot of FPs. Second, about 91 percent of FP alerts, equal to about 85 percent of false cases, are not related to security issues, but to management policy. For example, some companies and campuses limit or forbid their employees and students from using peer-to-peer applications; therefore, in order to easily detect P2P traffic, an IDS/IPS is configured to be sensitive to it. Hence, this causes alerts to be triggered easily regardless of whether the P2P application has malicious traffic or not. The last finding shows that buffer overflow, SQL server attacks, and worm slammer attacks account for 93 percent of FNs, even though they are aged attacks. This indicates that these attacks always have new variations to evade IDS/IPS detection. | en_US |
dc.language.iso | en_US | en_US |
dc.title | Statistical Analysis of False Positives and False Negatives from Real Traffic with Intrusion Detection/Prevention Systems | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/MCOM.2012.6163595 | en_US |
dc.identifier.journal | IEEE COMMUNICATIONS MAGAZINE | en_US |
dc.citation.volume | 50 | en_US |
dc.citation.issue | 3 | en_US |
dc.citation.spage | 146 | en_US |
dc.citation.epage | 154 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | 瑞昱交大聯合研發中心 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.contributor.department | Pealtek NCTU Joint Res Ctr | en_US |
dc.identifier.wosnumber | WOS:000301198700019 | - |
dc.citation.woscount | 4 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.