A Traffic Classification Algorithm For Intrusion Detection
A Traffic Classification Algorithm For Intrusion Detection
R : (param1 E Dl ...p aram, E D,) + prio,act (1) We devote this section to explain our traffic classifica-
tion approach. We consider the general case where a traffic
Example 1: division rule has n dimensions, i.e. n parameters to check.
R1 : (port-dest E http-ports,adr-dest E Among them, m parameters domains are defined as inter-
httpservers) + P I , N I D S l vals while the n - m = k remaining ones take the format
R2 : (adr-src E suspednetworks) -+ P2,honeypot of prefixes of bits string. The classification proceeds in two
R3 : (port-dest E [0..1024j7adrdest E steps. First, we construct a m-dimensional matrix in order
193.54.3.0124) + P3,N I D S 3 to cluster rules according to the m parameters represented
R4 : (port-dest E {22,23,80),adrdest E as intervals (see Figure 1). Then, we build for each group of
193.54.3.0126) + P4,N I D S 4 rules gathered in every matrix cell, a directed acyclic graph
(DAG). At runtime, we use the packet content to select a cell
We give in Example 1 four traffic division rules. We from the matrix then we traverse the corresponding DAG.
notice that an overlap occurs between R1 and R2 if an ad- The final nodes of the graph store information about the
dress from the suspect network emits a request to a web suitable action to apply on the packet.
21st InternationalConference on
Advanced Information Networkingand Applications Workshops (AINAW107) C~MPUTER
0-7695-2847-3107 $20.00 O 2007 IEEE SOCIETY
2. mask is the number of leftmostfied bits.
DAG
21st InternationalConference on
Advanced Information Networkingand Applications Workshops (AINAW'07) CO~PUTER
0-7695-2847-3107 $20.00 O 2007 IEEE SOCIETY
4.2.2 Classification DAG construction ,--..d4~-.--
dimension 1
\, {----A----
dmemsnsion 2
We construct the classification DAG in two steps. First, we Rule1 is J4asl .1 I 125 1 on 1 - I . I piority 3
start from the root node No to build recursively a prefix trie
representing only primary candidate rules paths. Then, be- 19 1 5 4 1 3 1 ' I 125 1O/6I I ' I toiDSZ;
L'riwnv 2
cause we have considered only primary rules, we have to Rule3 1 19 1 * 1 ' I . 1 1 25 1 015 1 .I . I 81DS3'
priority 1
complete the trie in the second stage.
The path of rule 1 I 19 / 25 1 4815 1 on
Prefix trie construction Thepathofrule2 119 1 5 4 1 3 125 1016 I
During the first step, we employ a recursive function he path of rule 3 la I 25 1 015
Build that takes a node and processes it to generate a trie. 121.l1.31