Mostrar el registro sencillo del ítem

Artículo

dc.creatorDíaz Verdejo, Jesúses
dc.creatorMuñoz Calle, Francisco Javieres
dc.creatorEstepa Alonso, Antonio Josées
dc.creatorEstepa Alonso, Rafael Maríaes
dc.creatorMadinabeitia Luque, Germánes
dc.date.accessioned2022-03-30T15:52:02Z
dc.date.available2022-03-30T15:52:02Z
dc.date.issued2022
dc.identifier.citationDíaz Verdejo, J., Muñoz Calle, F.J., Estepa Alonso, A.J., Estepa Alonso, R.M. y Madinabeitia Luque, G. (2022). On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks. Applied Sciences, 12 (2), 852
dc.identifier.issn2076-3417es
dc.identifier.urihttps://hdl.handle.net/11441/131524
dc.description.abstractSignature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have been pre-established. SIDS include standard packages of detection rulesets, but only those rules suited to the operational environment should be activated for optimal performance. However, some organizations might skip this tuning process and instead activate default off-the-shelf rulesets without understanding its implications and trade-offs. In this work, we help gain insight into the consequences of using predefined rulesets in the performance of SIDS. We experimentally explore the performance of three SIDS in the context of web attacks. In particular, we gauge the detection rate obtained with predefined subsets of rules for Snort, ModSecurity and Nemesida using seven attack datasets. We also determine the precision and rate of alert generated by each detector in a real-life case using a large trace from a public webserver. Results show that the maximum detection rate achieved by the SIDS under test is insufficient to protect systems effectively and is lower than expected for known attacks. Our results also indicate that the choice of predefined settings activated on each detector strongly influences its detection capability and false alarm rate. Snort and ModSecurity scored either a very poor detection rate (activating the less-sensitive predefined ruleset) or a very poor precision (activating the full ruleset). We also found that using various SIDS for a cooperative decision can improve the precision or the detection rate, but not both. Consequently, it is necessary to reflect upon the role of these open-source SIDS with default configurations as core elements for protection in the context of web attacks. Finally, we provide an efficient method for systematically determining which rules deactivate from a ruleset to significantly reduce the false alarm rate for a target operational environment. We tested our approach using Snort’s ruleset in our real-life trace, increasing the precision from 0.015 to 1 in less than 16 h of work. View Full-Textes
dc.description.sponsorshipMinisterio de Ciencias e Innovación (MICINN)/AEI 10.13039/501100011033: PID2020-115199RB-I00es
dc.description.sponsorshipFEDER/Junta de Andalucía-Consejería de Transformación Económica, Industria, Conocimiento y Universidades PYC20-RE-087-USEes
dc.formatapplication/pdfes
dc.format.extent16 p.es
dc.language.isoenges
dc.publisherMDPIes
dc.relation.ispartofApplied Sciences, 12 (2), 852
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectIntrusion detectiones
dc.subjectSIDS rules filteringes
dc.subjectSignature-based IDSes
dc.subjectWeb SIDSes
dc.titleOn the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attackses
dc.typeinfo:eu-repo/semantics/articlees
dcterms.identifierhttps://ror.org/03yxnpp24
dc.type.versioninfo:eu-repo/semantics/publishedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.contributor.affiliationUniversidad de Sevilla. Departamento de Ingeniería Telemáticaes
dc.relation.projectIDPYC20-RE-087-USEes
dc.relation.projectID10.13039/501100011033es
dc.relation.projectIDPID2020-115199RB-I00es
dc.relation.publisherversionhttps://www.mdpi.com/2076-3417/12/2/852es
dc.identifier.doi10.3390/app12020852es
dc.contributor.groupTIC154: Departamento de Ingeniería Telemáticaes
dc.journaltitleApplied Scienceses
dc.publication.volumen12es
dc.publication.issue2es
dc.publication.initialPage852es

FicherosTamañoFormatoVerDescripción
AS_2022_Díaz_On the Detection.pdf508.7KbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional