EMIST Network Intrusion Detection Software

Version 1.0


Overview Download User Manual Examples FAQ Contact

Overview

The EMIST NID (Network Intrusion Detection) tool is an off-line network intrusion system capable of detecting suspicious network traffic and extracting their corresponding signatures. The EMIST NID tool performs 5D multidimensional header-based clustering and anomaly detection to identify suspicious traffic, from which it can automatically extract suspicious signatures by applying a Generalized Suffix Tree based method.

References:
[1] J. Wang, D.J. Miller, and G. Kesidis. "Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification", IEEE JSAC on High-Speed Network Security, 2006.
[2] J. Wang, I. Hamadeh, G. Kesidis, and D.J. Miller. "Polymorphic Worm Detection and Defense: System Design, Experimental Methodology, and Data Resources", SIGCOMM Workshop on LSAD, 2006.


Download

License and Disclaimer Agreement

Copyright (c) 2006 The Pennsylvania State University
All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.


Pleas enter your name, organization and e-mail address
Name:                

Organization:      

E-mail:               


I accept this agreement and would like to proceed



Privacy statement: we do not give, sell, or transfer any personal information to a third party except as might be required by law.


User Manual

NID Software User Manual


Examples

In this section, we provide the detection report by using our EMIST NID tool on a worm-salted TCPDump trace.

Example.zip


FAQ

The PSU EMIST software newsgroup can be accessed at pubnews.cse.psu.edu server under cse.research.emist newsgroup.


Contact

For technique questions, please contact Jisheng Wang at jzw128@psu.edu.