chosen detection subsystems to interact sensibly and
offer practical benefits.
5.2 Future Work
There are matters that need further work and re-
search. The prototype is at the point of being further
tested. Experiments outlined in section 4 yielded
promising results regarding the combined detection
capabilities of the prototype. Real-world employ-
ment, result evaluation and tuning are a next logical
step along our efforts. We have to prove to what ex-
tent the solution resists against new, still unknown
attacks.
Current rulesets used for our testing deployments
need improving, as they may be too naive for real-
world malware and threats. Based on detection and
environment knowledge, extended sets of rules must
be developed for particular cases tailored to given
production environments to fully utilize the project-
ed advantages of these and other detection combina-
tions. This is also a key requirement for demonstra-
ting potential capabilities of the prototype. General
rulesets may also be created, but the full extent of
the beneficial impact is yet to be determined.
Areas regarding deployment and enforcement
possibilities have been considered and a noticeable
amount of ground research has been done, however
there is also still much to work on:
Cloud platforms are a prime candidate for our
solution. However, inquiries done in this field show
that along with them striving to deliver all-around
secure environment, they also severely limit the
execution possibilities for employment of different
intrusion detection methods compared to classic
LAN cases (promiscuous mode, iptables kernel
support, custom routing and network management as
analyzed in section 3.2).
As for enforcement, our current implementation
leverages iptables and ipset for Linux. There are
other similar tools available on different platforms
(access-lists on Cisco network devices, PF
26
for
BSD, and RRAS
27
in Windows Server), their en-
gagement is potentially possible (we have briefly
experimented with a few in order to confirm this),
but whether such usage would be entirely practical is
yet to be confirmed.
Considering the near-future course of our IPS
prototype development, some of the main subjects of
26
stateful packet filter comparable to iptables
27
Routing and Remote Access Service – http://
technet.microsoft.com/en-us/library/dd469714.aspx
the work to be done are large data measurements in
both artificial and real enterprise networks with
actual imminent threats present.
ACKNOWLEDGEMENTS
This research has been supported by Czech Ministry
of the Interior within the project named “Applied
research of a method of an efficient management of
network security of data centers, servers and cloud
services verified by practical measurements”, grant
number VG20122014086, PID VG2VS/242.
REFERENCES
ArcSight, Inc., 2009. Common Event Format. [Online]
Available at: http://mita-tac.wikispaces.com/file/
view/CEF+White+Paper+071709.pdf [Accessed
December 2013].
B. Claise, E., 2004. Cisco Systems NetFlow Services
Export Version 9. [Online] Available at:
http://tools.ietf.org/html/rfc3954
Debar, H., Curry, D. & Feinstein, B., 2007. The Intrusion
Detection Message Exchange Format. [Online]
Available at: http://tools.ietf.org/html/rfc4765
Fielding, R. T., 2000. Representational State Transfer. In:
Architectural Styles and the Design of Network-based
Software Architectures. Irvine: University of Califor-
nia, pp. 76-97.
García-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández,
G. & Vázquez, E., 2009. Anomaly-based network in-
trusion detection: Techniques, systems and challenges.
Computers & Security, 28(1-2), pp. 18-28.
Gómez, J. et al., 2009. Design of a snort-based hybrid
intrusion detection system. In: Distributed Computing,
Artificial Intelligence, Bioinformatics, Soft Computing,
and Ambient Assisted Living. Berlin: Springer, pp.
515-522.
International Organization for Standardization, 1996.
ISO/IEC standard 7498-1:1994. [Online].
Kazienko, P. & Dorosz, P., 2003. Intrusion Detection
Systems (IDS) Part I. [Online] Available at:
http://www.systemcomputing.org/ssm10/intrusion_det
ection_systems_architecture.htm [Accessed February
2014].
Leblond, E., 2013. Using NFQUEUE and
libnetfilter_queue. [Online] Available at:
https://home.regit.org/netfilter-en/using-nfqueue-and-
libnetfilter_queue/ [Accessed November 2013].
Lim, S. Y. & Jones, A., 2008. Network anomaly detection
system: The state of art of network behaviour analy-
sis.. s.l., s.n., pp. 459-465.
Network Instruments, 2013. TAP vs SPAN. [Online]
Available at:
SECRYPT2014-InternationalConferenceonSecurityandCryptography
424