You are here

Automatic Generation of Robust Network Intrusion Detection Signatures

Award Information
Agency: Department of Defense
Branch: Army
Contract: W911NF-06-C-0168
Agency Tracking Number: O064-NC2-2032
Amount: $99,948.00
Phase: Phase I
Program: STTR
Solicitation Topic Code: OSD06-NC2
Solicitation Number: N/A
Timeline
Solicitation Year: 2006
Award Year: 2006
Award Start Date (Proposal Award Date): 2006-09-15
Award End Date (Contract End Date): 2007-09-15
Small Business Information
3001 Red Hill Avenue, Building #4-108
Costa Mesa, CA 92626
United States
DUNS: 038058038
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 John Leon
 Systems Engineer
 (714) 435-8920
 jleon@irvine-sensors.com
Business Contact
 Daryl Smetana
Title: VP, Operations
Phone: (714) 444-8760
Email: dsmetana@irvine-sensors.com
Research Institution
 NORTH CAROLINA STATE UNIV.
 Paul Franzon
 
EGRC 419, 2410 Campus Shore Dr
Raleigh, NC 27606
United States

 (919) 515-7351
 Nonprofit College or University
Abstract

Irvine Sensors Corporation (ISC) together with North Carolina State University propose to develop a novel behavioral technique that is capable of detecting network based intrusions, and can then be used to identify signatures for an Intrusion Prevent Engine (IPE). The behavioral technique proposed detects attacks embedded in different network layers using assertions that can be dynamically updated in real time. The technique involves performing deep packet inspection and making access control decisions based on behavioral compliance. Network traffic behavior is modeled by using theories. Our Behavioral IDS use models of correct and incorrect behaviors, rather than search for signatures. Furthermore, most current approaches do not provide application layer defense. In our approach, the network transactions can be verified as being incorrect or correct, by comparing them against a written set of high-level assertions (“theories”) as to proper behavior. This approach has the potential to detect and prevent network based attacks in real time and also permits theories to be updated in real time.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government