Skip to main content

Specification-Based Intrusion Detection Using Sequence Alignment and Data Clustering

  • Conference paper
  • First Online:
  • 766 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 523))

Abstract

In this paper, we present our work on specification-based intrusion detection. Our goal is to build a web application firewall which is able to learn the normal behaviour of an application (and/or the user) from the traffic between a client and a server. The model learnt is used to validate future traffic. We will discuss later in this paper, the interactions between the learning phase and the exploitation phase of the generated model expressed as a set of regular expressions. These regular expressions are generated after a process of sequence alignment combined to BRELA (Basic Regular Expression Learning Algorithm) or directly by the later. We also present our multiple sequence alignment algorithm called AMAA (Another multiple Alignment Algorithm) and the usage of data clustering to improve the generated regular expressions. The detection phase is simulated in this paper by generating data which represent a traffic and using a pattern matcher to validate them.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    In the rest of the paper, the term behaviour and specification are considered the same.

  2. 2.

    These criteria are explained on http://en.wikipedia.org/wiki/F1_score.

  3. 3.

    https://dst.lbl.gov/ACSSoftware/colt/.

  4. 4.

    http://alias-i.com/lingpipe/index.html.

References

  1. Adams, N., Heard, N.: Data Analysis for Network Cyber-Security. World Scientific, Singapore (2014)

    Book  Google Scholar 

  2. Bartoli, A., Davanzo, G., De Lorenzo, A., Mauri, M., Medvet, E., Sorio, E.: Automatic generation of regular expressions from examples with genetic programming. In: Proceedings of the 14th Annual Conference Companion on Genetic and Evolutionary Computation, pp. 1477–1478. ACM (2012)

    Google Scholar 

  3. Böckenhauer, H.J., Bongartz, D.: Algorithmic Aspects of Bioinformatics. Natural Computing Series. Springer, Heidelberg (2007)

    MATH  Google Scholar 

  4. De La Higuera, C.: A bibliographical study of grammatical inference. Pattern Recognit. 38(9), 1332–1348 (2005)

    Article  Google Scholar 

  5. Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Comput. Netw. 31(8), 805–822 (1999)

    Article  Google Scholar 

  6. Fernau, H.: Algorithms for learning regular expressions from positive data. Inf. Comput. 207(4), 521–541 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  7. Garcia-Teodoro, P.: Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur. 28(1), 18–28 (2009)

    Article  Google Scholar 

  8. Jokar, P., Nicanfar, H., Leung, V.C.M.: Specification-based intrusion detection for home area networks in smart grids. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 208–213. IEEE (2011)

    Google Scholar 

  9. Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Comput. Netw. 48(5), 717–738 (2005)

    Article  Google Scholar 

  10. Li, Y., Krishnamurthy, R., Raghavan, S., Vaithyanathan, S., Jagadish, H.V.: Regular expression learning for information extraction. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, pp. 21–30. Association for Computational Linguistics (2008)

    Google Scholar 

  11. Li, Z., Sanghi, M., Chen, Y., Kao, M.-Y., Chavez, B.: Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience. In: 2006 IEEE Symposium on Security and Privacy, 15 p. IEEE (2006)

    Google Scholar 

  12. Mouelhi, T.: Testing and Modeling Security Mechanisms in Web Applications. Theses, Institut National des Télécommunications (2010)

    Google Scholar 

  13. Newsome, J., Karp, B., Song, D.: Polygraph: automatically generating signatures for polymorphic worms. In: 2005 IEEE Symposium on Security and Privacy, pp. 226–241. IEEE (2005)

    Google Scholar 

  14. Notredame, C., Higgins, D.G., Heringa, J.: T-coffee: a novel method for fast and accurate multiple sequence alignment. J. Mol. Biol. 302(1), 205–217 (2000)

    Article  Google Scholar 

  15. Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proc. IEEE 63(9), 1278–1308 (1975)

    Article  Google Scholar 

  16. Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (idps). NIST Spec. Publ. 800(2007), 94 (2007)

    Google Scholar 

  17. Tang, Y., Lu, X., Xiao, B.: Generating simplified regular expression signatures for polymorphic worms. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 478–488. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  18. Tang, Y., Xiao, B., Xicheng, L.: Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms. Comput. Secur. 28(8), 827–842 (2009)

    Article  Google Scholar 

  19. Uppuluri, P., Sekar, R.: Experiences with specification-based intrusion detection. In: Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. LNCS, vol. 2212, p. 172. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  20. Vigna, G., Valeur, F., Kemmerer, R.A.: Designing and implementing a family of intrusion detection systems. In: ACM SIGSOFT Software Engineering Notes, vol. 28, pp. 88–97. ACM (2003)

    Google Scholar 

  21. Ye, N., Li, X., Chen, Q., Emran, S.M., Xu, M.: Probabilistic techniques for intrusion detection based on computer audit data. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 31(4), 266–274 (2001)

    Article  Google Scholar 

Download references

Acknowledgements

This work is a part of the RoCaWeb project carried at Kereval and Telecom-Bretagne and financed as a RAPID project by the DGA-MI. We would like to thank Alain Ribault, Constant Chartier, Fr?d?ric Majorczyk and Yacine Tamoudi.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Djibrilla Amadou Kountché .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Amadou Kountché, D., Gombault, S. (2015). Specification-Based Intrusion Detection Using Sequence Alignment and Data Clustering. In: Doss, R., Piramuthu, S., ZHOU, W. (eds) Future Network Systems and Security. FNSS 2015. Communications in Computer and Information Science, vol 523. Springer, Cham. https://doi.org/10.1007/978-3-319-19210-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19210-9_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19209-3

  • Online ISBN: 978-3-319-19210-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics