Signature based intrusion detection for zero-day attacks: (Not) A closed chapter?

64Citations
Citations of this article
83Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A frequent claim that has not been validated is that signature based network intrusion detection systems (SNIDS) cannot detect zero-day attacks. This paper studies this property by testing 356 severe attacks on the SNIDS Snort, configured with an old official rule set. Of these attacks, 183 attacks are zero-days' to the rule set and 173 attacks are theoretically known to it. The results from the study show that Snort clearly is able to detect zero-days' (a mean of 17% detection). The detection rate is however on overall greater for theoretically known attacks (a mean of 54% detection). The paper then investigates how the zero-days' are detected, how prone the corresponding signatures are to false alarms, and how easily they can be evaded. Analyses of these aspects suggest that a conservative estimate on zero-day detection by Snort is 8.2%. © 2014 IEEE.

Cite

CITATION STYLE

APA

Holm, H. (2014). Signature based intrusion detection for zero-day attacks: (Not) A closed chapter? In Proceedings of the Annual Hawaii International Conference on System Sciences (pp. 4895–4904). IEEE Computer Society. https://doi.org/10.1109/HICSS.2014.600

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free