Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs
Arka Ghosh, Massimiliano Albanese, Preetam Mukherjee, Amir Alipour-Fanid
2024
Abstract
Intrusion Detection Systems (IDS) are strategically installed on specific nodes of an enterprise network to detect ongoing attempts to exploit vulnerable systems. However, deploying a large number of detection rules in each IDS may reduce their efficiency and effectiveness, especially when an IDS is monitoring high-speed data communication channels. Existing research on optimal IDS placement strategies does not address the problem at such a level of granularity. This paper proposes a novel approach for strategic rule deployment subject to various practical constraints. Attack graph-based modeling, along with knowledge of the network topology, is employed to identify the set of suitable rules for deployment on individual IDSs, and capacity constraints are considered to balance the load across IDSs. We provide a formal specification of the optimization problem and propose a practical heuristic solution based on a genetic algorithm.
DownloadPaper Citation
in Harvard Style
Ghosh A., Albanese M., Mukherjee P. and Alipour-Fanid A. (2024). Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs. In Proceedings of the 21st International Conference on Security and Cryptography - Volume 1: SECRYPT; ISBN 978-989-758-709-2, SciTePress, pages 536-543. DOI: 10.5220/0012814500003767
in Bibtex Style
@conference{secrypt24,
author={Arka Ghosh and Massimiliano Albanese and Preetam Mukherjee and Amir Alipour-Fanid},
title={Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs},
booktitle={Proceedings of the 21st International Conference on Security and Cryptography - Volume 1: SECRYPT},
year={2024},
pages={536-543},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012814500003767},
isbn={978-989-758-709-2},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 21st International Conference on Security and Cryptography - Volume 1: SECRYPT
TI - Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs
SN - 978-989-758-709-2
AU - Ghosh A.
AU - Albanese M.
AU - Mukherjee P.
AU - Alipour-Fanid A.
PY - 2024
SP - 536
EP - 543
DO - 10.5220/0012814500003767
PB - SciTePress