Browse > Article

Automated Signature Sharing to Enhance the Coverage of Zero-day Attacks  

Kim, Sung-Ki (선문대학교 IT교육학부)
Jang, Jong-Soo (한국전자통신연구원)
Min, Byoung-Joon (인천대학교 컴퓨터공학과)
Abstract
Recently, automated signature generation systems(ASGSs) have been developed in order to cope with zero-day attacks with malicious codes exploiting vulnerabilities which are not yet publically noticed. To enhance the usefulness of the signatures generated by (ASGSs) it is essential to identify signatures only with the high accuracy of intrusion detection among a number of generated signatures and to provide them to target security systems in a timely manner. This automated signature exchange, distribution, and update operations have to be performed in a secure and universal manner beyond the border of network administrations, and also should be able to eliminate the noise in a signature set which causes performance degradation of the security systems. In this paper, we present a system architecture to support the identification of high quality signatures and to share them among security systems through a scheme which can evaluate the detection accuracy of individual signatures, and also propose a set of algorithms dealing with exchanging, distributing and updating signatures. Though the experiment on a test-bed, we have confirmed that the high quality signatures are automatically saved at the level that the noise rate of a signature set is reduced. The system architecture and the algorithm proposed in the paper can be adopted to a automated signature sharing framework.
Keywords
Intrusion Detection; Signature; Data Distribution;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Julia Allen, Alan Christie,William Fithen, John McHugh, Jed Pickel, and Ed Stoner. State of the Practice of Intrusion Detection Technologies. Technical Report 99tr028, Carnegie Mellon - Software Engineering Institute, 2000.
2 Adriano M. Cansian, Artur R. A. da Silva, Marcelo de Souza : An Attack Signature Model To Computer Security Intrusion Detection. IEEE 2002.
3 Internet Engineering Task Force - Common Intrusion Detection Signature Standard. http://tools.ietf.org/html/draft-wierzbicki-cidss-05. SeptXMber 4, .
4 Common Vulnerability Exposure, http://cve.mitre.org/
5 BugtraqID, http://www.securityfocus.com
6 http://xforce.iss.net/xforce/xfdb/2019
7 http://www.metasploit.com
8 http://www.remote-exploit.org
9 http://www.emergingthreats.net
10 http://www.colasoft.com
11 Eric Frimpong, M.H.MacGregor, "A Performance Study of the Snort IDS," TR08-04, Department of Computing Science, University of Alberta, Feb, 2008.
12 L. Perrochon. Using context-based correlation in network operations management. Technical report, Stanford University Department of Computer Science, 1999. http://pavg.stanford.edu/cep/ cidf.ps.gz.
13 Eugene H. Spafford and Diego Zamboni, Intrusion detection using autonomous agents, Elsevier, Computer Networks, 34(4):547-570, October 2000.   DOI   ScienceOn
14 Eugene H. Spafford and Diego Zamboni, Intrusion detection using autonomous agents, Elsevier, Computer Networks, 34(4):547-570, October 2000.   DOI   ScienceOn
15 H.A. Kim and B. Karp, "Autograph: Toward Automated, Distributed, Worm Signature Detection," 13th Usenix Security Symposium, 2004.
16 Philip A Porras and Peter G Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of the 20th National Information SystXMs Security Conference, pages 353.365, Baltimore, Maryland, USA, 7.10 October 1997. NIST, National Institute of Standards and Technology/National Computer Security Center.
17 Undercoer, J.L., Perich, F., Nicholas, C.: SHOMAR: An Open Architecture for Distributed Intrusion Detection Services. Technical report, University of Maryland, Baltimore County (2002).
18 C. Kreibich and J Crowcroft, "Honeycomb - Creating Intresion Detection Signatures Using Honeypots," Workshop on Hot Topics in Networks, 2003.
19 S. Sinh, et. al., "Automated Worm Fingerprinting," 6th Symposium on Operating System Design and Implementation, 2004.
20 오진태, 김익균, 장종수, 전용희, "제로데이 웜 공격 대 응을 위한 ZASMIN 시스템 구조", 한국정보보호학회, 제18권 제1호, 2008. 2.   과학기술학회마을