DocumentCode
2415978
Title
An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems
Author
Mutz, Darren ; Vigna, Giovanni ; Kemmerer, Richard
Author_Institution
Reliable Software Group, California Univ., Santa Barbara, CA, USA
fYear
2003
fDate
8-12 Dec. 2003
Firstpage
374
Lastpage
383
Abstract
Signature-based intrusion detection systems use a set of attack descriptions to analyze event streams, looking for evidence of malicious behavior. If the signatures are expressed in a well-defined language, it is possible to analyze the attack signatures and automatically generate events or series of events that conform to the attack descriptions. This approach has been used in tools whose goal is to force intrusion detection systems to generate a large number of detection alerts. The resulting "alert storm" is used to desensitize intrusion detection system administrators and hide attacks in the event stream. We apply a similar technique to perform testing of intrusion detection systems. Signatures from one intrusion detection system are used as input to an event stream generator that produces randomized synthetic events that match the input signatures. The resulting event stream is then fed to a number of different intrusion detection systems and the results are analyzed. This paper presents the general testing approach and describes the first prototype of a tool, called Mucus, that automatically generates network traffic using the signatures of the Snort network-based intrusion detection system. The paper describes preliminary cross-testing experiments with both an open-source and a commercial tool and reports the results. An evasion attack that was discovered as a result of analyzing the test results is also presented.
Keywords
computer networks; message authentication; telecommunication security; telecommunication traffic; IDS stimulator; black-box testing; digital signatures; evasion attacks; network intrusion detection system; network traffic generation; software testing; Application software; Automatic testing; Computer network reliability; Computer science; Impedance matching; Intrusion detection; Performance analysis; Performance evaluation; System testing; Telecommunication traffic;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Applications Conference, 2003. Proceedings. 19th Annual
Print_ISBN
0-7695-2041-3
Type
conf
DOI
10.1109/CSAC.2003.1254342
Filename
1254342
Link To Document