DocumentCode
2235472
Title
A Methodology for Evaluation of Host-Based Intrusion Prevention Systems and Its Application
Author
Labbe, Keith G. ; Rowe, Neil C. ; Fulp, J.D.
Author_Institution
US Naval Postgraduate Sch., Monterey, CA
fYear
2006
fDate
21-23 June 2006
Firstpage
378
Lastpage
379
Abstract
Host-based intrusion-prevention systems are currently popular technologies which try to prevent exploits from succeeding on a host. They are like host-based intrusion-detection systems (P. E. Proctor, 2001) but include means to automatically take actions once malicious activities or code are discovered. This can include terminating connections, services, or ports; refusing commands; blocking packets from specific Internet addresses; initiating tracing of packets; and sending modified packets back to a user. Automated responses to exploits can be quick without human intervention. Around ten commercial vendors are currently offering intrusion-prevention products (N. Desai, May 2006), and Snort-Inline is a popular open-source tool. Total intrusion prevention is a difficult goal to achieve, since it takes time to recognize an exploit and by then the damage may be done. So it is important to have a way to test the often-broad claims of intrusion-prevention products. The testing we propose is not as comprehensive as that offered by attack-traffic simulators like Skaion´s TGS (www.skaion.com) or by the DETER testbed (www.deterlab.net). But attack-traffic simulators, even when up-to-date, only model broad characteristics of attacks and not their context-dependent behavior, so they can produce significant numbers of false negatives. DETER emulates rather than executes malicious software to provide added safety, which is not quite the same. DETER also imposes several bureaucratic obstacles for getting approval for experiments and obtaining time on their hardware to run them; this bureaucracy requires motivation and time to navigate. For quick testing in depth of a new product that has not been evaluated in DETER, or for finding reasons to rule out a product, a simpler approach that is easier to set up is required
Keywords
public domain software; security of data; attack-traffic simulators; host-based intrusion-prevention systems; malicious activities; popular open-source tool; Context modeling; File servers; Hardware; Humans; Open source software; Operating systems; Payloads; Software safety; System testing; Web and internet services;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Assurance Workshop, 2006 IEEE
Conference_Location
West Point, NY
Print_ISBN
1-4244-0130-5
Type
conf
DOI
10.1109/IAW.2006.1652120
Filename
1652120
Link To Document