Abstract
Building intrusion detection model in an automatic and online way is worth discussing for timely detecting new attacks. This paper gives a scheme to automatically construct snort rules based on data captured by honeypots on line. Since traffic data to honeypots represent abnormal activities, activity patterns extracted from those data can be used as attack signatures. Packets captured by honeypots are unwelcome, but it appears unnecessary to translate each of them into a signature to use entire payload as activity pattern. In this paper, we present a way based on system specifications of honeypots. It can reflect seriousness level of captured packets. Relying on discussed system specifications, only critical packets are chosen to generate signatures and discriminating values are extracted from packet payload as activity patterns. After formalizing packet structure and syntax of snort rule, we design an algorithm to generate snort rules immediately once it meets critical packets.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley, Reading (2002)
Honeynet Project, Know Your Enemy, Honeynets, http://project.honeynet.org/papers/honeynet/
Roesch, M.: Snort-lightweight intrusion detection for networks. In: 1999 USENIX (1999)
Ilgun, K., et al.: IEEE T. on Software Eng. 21(3), 181–199 (1995)
Paxson, V.: Computer Networks 31(23/24), 2435–2463 (1999)
Li, M.: An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition. Computer & Security (2004) (to appear)
Kemmerer, R.A., Vigna, G.: Supplement to Computer 35(4), 27–30 (2002)
Eckmann, S.T.: Proc., RAID, LNCS, vol. 2212, pp. 69–84 (2001)
Kendall, K.: A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems, Master Thesis, MIT (1999)
Roesch, M., Green, C.: Snort users manual, http://www.snort.org/docs/SnortUsers-Manual.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 IFIP International Federation for Information Processing
About this paper
Cite this paper
Chi, CH., Li, M., Liu, D. (2004). A Method to Obtain Signatures from Honeypots Data. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds) Network and Parallel Computing. NPC 2004. Lecture Notes in Computer Science, vol 3222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30141-7_61
Download citation
DOI: https://doi.org/10.1007/978-3-540-30141-7_61
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23388-6
Online ISBN: 978-3-540-30141-7
eBook Packages: Springer Book Archive