@inproceedings{2018:ganesan:dynamics_signature_ids_abductive,type={proceedings},doi={10.48550/arXiv.1903.12101},booktitle={ACM Dynamic and Novel Advances in Machine Learning and Intelligent Cyber Security (DYNAMICS) Workshop},publisher={arXiv},address={San Juan, Puerto Rico, USA},volume={arXiv/cs.CR},id={2018:ganesan:dynamics_signature_ids_abductive},year={2018},month={12},day={},date={2018-12},title={Extending Signature-based Intrusion Detection Systems WithBayesian Abductive Reasoning},author={Ganesan, Ashwinkumar and Parameshwarappa, Pooja and Peshave, Akshay and Chen, Zhiyuan and Oates, Tim},url={https://doi.org/10.48550/arXiv.1903.12101}}
Extending Signature-based Intrusion Detection Systems WithBayesian Abductive Reasoning
Ganesan, Ashwinkumar; Parameshwarappa, Pooja; Peshave, Akshay; Chen, Zhiyuan; Oates, Tim
ACM Dynamic and Novel Advances in Machine Learning and Intelligent Cyber Security (DYNAMICS) Workshop 2018 December
ABSTRACT : Evolving cybersecurity threats are a persistent challenge for system administrators and security experts as new malwares are continually released. Attackers may look for vulnerabilities in commercial products or execute sophisticated reconnaissance campaigns to understand a targets network and gather information on security products like firewalls and intrusion detection / prevention systems(network or host-based). Many new attacks tend to be modifications of existing ones. In such a scenario, rule-based systems fail to detect the attack, even though there are minor differences in conditions /attributes between rules to identify the new and existing attack. To detect these differences the IDS must be able to isolate the subset of conditions that are true and predict the likely conditions (different from the original) that must be observed. In this paper, we propose a probabilistic abductive reasoning approach that augments an exist-ing rule-based IDS (snort [29]) to detect these evolved attacks by (a)Predicting rule conditions that are likely to occur (based on existing rules) and (b) able to generate new snort rules when provided with seed rule (i.e. a starting rule) to reduce the burden on experts to constantly update them. We demonstrate the effectiveness of the approach by generating new rules from the snort 2012 rules set and testing it on the MACCDC 2012 dataset.