Author:
Asad H.,Adhikari S.,Gashi Ilir
Abstract
AbstractThe signature-based network intrusion detection systems (IDSs) entail relying on a pre-established signatures and IP addresses that are frequently updated to keep up with the rapidly evolving threat landscape. To effectively evaluate the efficacy of these updates, a comprehensive, long-term assessment of the IDSs’ performance is required. This article presents a perspective–retrospective analysis of the Snort and Suricata IDSs using rules that were collected over a 4-year period. The study examines how these IDSs perform when monitoring malicious traffic using rules from the past, as well as how they behave when monitoring the same traffic using updated rules in the future. To accomplish this, a set of Snort Subscribed and Suricata Emerging Threats rules were collected from 2017 to 2020, and a labeled PCAP data from 2017 to 2018 was analyzed using past and future rules relative to the PCAP date. In addition to exploring the evolution of Snort and Suricata IDSs, the study also analyses the functional diversity that exists between these IDSs. By examining the evolutionary behavior of signature-based IDSs and their diverse configurations, the research provides valuable insights into how their performance can be impacted. These insights can aid security architects in combining and layering IDSs in a defence-in-depth deployment.
Funder
Engineering and Physical Sciences Research Council
Horizon 2020 Framework Programme
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference33 articles.
1. Asad, H., Gashi, I.: Diversity in open source intrusion detection systems. In: International Conference on Computer Safety, Reliability, and Security, pp. 267–281. Springer (2018)
2. Asad, H., Gashi, I.: Dynamical analysis of diversity in rule-based open source network intrusion detection systems. Empir. Softw. Eng. 27(1), 1–30 (2022)
3. Canadian Institute for Cybersecurity. CIC - University of New Brunswick. https://www.unb.ca/cic/about/hub.html (2022). Accessed 03 Jan 2022
4. Pathan, A.-S.K.: The State of the Art in Intrusion Prevention and Detection. CRC Press, Boca Raton (2014)
5. Snort Rules: https://snort.org/documents/registered-vs-subscriber (2021). Visited on 18 Apr 2021