Download presentation
Presentation is loading. Please wait.
Published byDinah Fisher Modified over 9 years ago
1
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726
2
Introduction Looking to expand the ability of current basic Intrusion Detection Systems (IDS) to be able to process real-time complex attack intelligence into their current operation.
3
Intrusion Detection System (IDS) “Device or software application that monitors network or system traffic for malicious activities or policy violations”
4
The Identified Issue Current IDS’ are unable to integrate external information into their processing Current approach is to convert to rule language “…it severely limits the attainable benefits…” Ensuring that by using real-time intelligence the IDS can handle realistic workloads
5
The Proposed Solution Development of an Input Framework with integration to a current open-source IDS. Using federated sources to provide valid, consistent attack intelligence Real-world scenario deployment and monitoring to test suitability
6
The Intelligence State “Externally provided context that, when correlated with traffic on the wire, can significantly increase the systems detection capabilities.”
7
Framework Design
8
Implementation and Integration Using the open-source Bro IDS Bro fits well with capabilities of Input Framework Bro turns streams of packets into “policy neutral” network events
9
Framework with Bro
10
Using Federated Blacklists The authors use the SES feed from REN-ISAC and the JC3 feed from DOE. Confidence in accuracy and quality of intelligence important Choice of private sources over public sources Integration with Input Framework
11
Real World Testing Tested on a trace of traffic from UC Berkeley network Utilised psuedo-realtime mode running on trace file Analysed performance on: Realistic Workloads Sustainable Load Latency Created Benchmark Reader
12
Summary Input Framework created and deployed on existing open- source IDS - Bro Adding another state to IDS – intelligence Real-world testing to determine suitability in network
13
Criticisms Firewall Impact Testing overall detection effectiveness Choice of IDS – Bro Access to blacklists used Network traffic tested quite limited
14
Firewall Impact The authors make no reference to how a firewall will impact traffic monitoring in their tests Testing was only done on trace from one particular network Firewalls affect the type of traffic allowed/disallowed
15
Overall effectiveness In the paper, there isn’t a comparison done between a network using Real-Time Intelligence with an IDS and one without any intelligence
16
Using Bro The choice of Bro isn’t very clearly explained No comparison between other IDS’s and to why/why not Bro was selected
17
Access to Federated Blacklists SES feed updated once per day JC3 feed downloaded manually from a secure server when updates released Difficult to access Vetting period not accounted for with “real-time”
18
Limitations of tested traffic
19
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.