Evaluation of Intrusion Detection Systems Under Denial of Service Attack in Virtual

Evaluation of Intrusion Detection Systems Under Denial of Service Attack in Virtual

Master of Science in Computer Science Engineering October 2017 Evaluation of Intrusion Detection Systems under Denial of Service Attack in virtual Environment Comparative study of Snort, Suricata and OSSEC Venkatesh Nagadevara Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden This thesis is submitted to the Faculty of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Computer Science Engineering. The thesis is equivalent to 20 weeks of full time studies. Contact Information: Author(s): Venkatesh Nagadevara E-mail: [email protected] University advisor: Emiliano Casalicchio Department of Computer Science and Engineering Faculty of Computing Internet : www.bth.se Blekinge Institute of Technology Phone : +46 455 38 50 00 SE-371 79 Karlskrona, Sweden Fax : +46 455 38 50 57 i ABSTRACT Context. The intrusion detection systems are being widely used for detecting the malicious traffic in many industries and they use a variety of technologies. Each IDs had different architecture and are deployed for detecting malicious activity. Intrusion detection system has a different set of rules which can defined based on requirement. Therefore, choosing intrusion detection system for and the appropriate environment is not an easy task. Objectives. The goal of this research is to evaluate three most used open source intrusion detection systems in terms of performance. And we give details about different types of attacks that can be detected using intrusion detection system. The tools that we select are Snort, Suricata, OSSEC. Methods. The experiment is conducted using TCP, SCAN, ICMP, FTP attack. Each experiment was run in different traffic rates under normal and malicious traffics all rule are active. All these tests are conducted in a virtual environment. Results. We can calculate the performance of IDS by using CPU usage, memory usage, packet loss and a number of alerts generated. These results are calculated for both normal and malicious traffic. Conclusions. We conclude that results vary in different IDS for different traffic rates. Specially snort showed better performance in alerts identification and OSSEC in the performance of IDS. These results indicated that alerts are low when the traffic rates high are which indicates this is due to the packet loss. Overall OSSEC provides better performance. And Snort provides better performance and accuracy for alert detection. Keywords: Intrusion Detection System, Snort, OSSEC, Suricata, Network Traffic. TABLE OF CONTENTS COMPARATIVE STUDY OF SNORT, SURICATA AND OSSEC ..................................................... I! ABSTRACT ............................................................................................................................................ I! TABLE OF CONTENTS ..................................................................................................................... II! LIST OF TABLES .............................................................................................................................. IV! LIST OF FIGURES .............................................................................................................................. V! 1! INTRODUCTION ......................................................................................................................... 1! 1.1! MOTIVATION ........................................................................................................................... 2! 1.2! PROBLEM STATEMENT ............................................................................................................. 3! 1.3! AIMS AND OBJECTIVES ........................................................................................................... 3! 1.3.1! Aim ..................................................................................................................................... 3! 1.3.2! Objectives ........................................................................................................................... 3! 1.4! RESEARCH QUESTIONS ........................................................................................................... 3! 1.5! STRUCTURE OF THESIS ............................................................................................................ 3! 2! BACKGROUND ........................................................................................................................... 5! 2.1! FRAMEWORK FOR COMMON INTRUSION DETECTION SYSTEM .................................................. 5! 2.2! SURICATA ............................................................................................................................... 5! 2.2.1! Architecture ........................................................................................................................ 5! 2.2.2! Suricata Rule Structure ...................................................................................................... 6! 2.3! SNORT ..................................................................................................................................... 7! 2.3.1! Snort Architecture .............................................................................................................. 8! 2.3.2! Snort Rule Structure ........................................................................................................... 8! 2.4! OSSEC ................................................................................................................................... 9! 2.4.1! OSSEC Architecture ......................................................................................................... 10! 2.4.2! OSSEC Rule Structure ..................................................................................................... 10! 2.5! SUMMARY ............................................................................................................................. 11! 3! METHODOLOGY ...................................................................................................................... 13! 3.1! INTRODUCTION ..................................................................................................................... 13! 3.2! PLANNING LITERATURE REVIEW ........................................................................................... 13! 3.2.1! The need for literature review .......................................................................................... 13! 3.2.2! Research question ............................................................................................................ 13! 3.2.3! Keyword selection ............................................................................................................ 14! 3.2.4! Inclusion and Exclusion criteria ...................................................................................... 14! 3.3! LITERATURE REVIEW ............................................................................................................ 14! The following are the some of the useful methods and papers that are useful to carry our experiment. .................................................................................................................................... 14! 4! EXPERIMENT ............................................................................................................................ 17! 4.1! TYPES OF ATTACKS THAT CAN BE DETECTED USING INTRUSION DETECTION SYSTEMS. ..... 17! 4.2! TOOLS USED IN EXPERIMENTATION ....................................................................................... 19! 4.3! EXPERIMENTATION SETUP ..................................................................................................... 21! 4.4! HARDWARE AND SOFTWARE ................................................................................................. 22! 4.5! PERFORMANCE METRICS ...................................................................................................... 22! 5! RESULTS AND ANALYSIS ...................................................................................................... 23! 5.1! EXPERIMENT 1 AND RESULT .................................................................................................. 23! 5.2! EXPERIMENT 2 AND RESULTS ................................................................................................ 26! 5.2.1! TCP attack ....................................................................................................................... 27! 5.2.2! FTP attack ........................................................................................................................ 30! 5.2.3! ICMP Attack ..................................................................................................................... 34! 5.2.4! SCAN Attack ..................................................................................................................... 38! ii 5.3! EXPERIMENT 3 ...................................................................................................................... 42! 6! DISCUSSION .............................................................................................................................. 44! 6.1! ANSWERS TO RESEARCH QUESTIONS .................................................................................... 44! 6.2! THREATS OF VALIDITY .........................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    57 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us