Intrusion Detection Systems using Genetic Algorithms

Size: px
Start display at page:

Download "Intrusion Detection Systems using Genetic Algorithms"

Transcription

1 King Saud University Computer Science Collage CSC590_Selected Topic A Literature Review on Intrusion Detection Systems using Genetic Algorithms Phase # 5 By: Lamees Alhazzaa ID: Proposed to: Dr. Hassan Mathkour 1

2 Abstract This paper presents a general overview of Intrusion Detection Systems and the methods used in these systems, giving brief points of the design principles and the major trends. Artificial intelligence techniques are widely used in this area such as fuzzy logic and Genetic algorithms. In this paper, we will focus on the Genetic algorithm technique and how it could be used in Intrusion Detection Systems giving some examples of systems and experiments proposed in this field. The purpose of this paper is to give a clear understanding of the use of Genetic Algorithms in IDS. 2

3 Table of contents Table of Figures... 4 Introduction... 5 Introduction... 5 Chapter Intrusion Detection Systems (IDS)... 6 Intrusion Detection... 6 IDS Design Principles... 7 IDS Design Trends... 7 Chapter Artificial Intelligence and Intrusion Detection... 9 Artificial Intelligence Systems ANN (Artificial Neural Networks) Approach Fuzzy Logic Genetic Algorithms Chapter Using Genetic Algorithms in Intrusion Detection Systems A Generic GA-based intrusion detection approach Chapter Proposed experiments on using GA in IDS Related work Some proposed systems Conclusion References

4 Table of Figures Figure 1 : Structure of Simple GA [16] Figure 2 : The operation of GA [8] Figure 3 : Algorithm [8] Figure 4 : Results of Experiment [28]

5 Introduction With the appearance of information leap in the business world and the fast pace of communication, network systems and technologies has been of a major concern to keep up with the speedy flow of information spread and communication in any where around the world. Increase of network scale, development of advanced information technologies, and other factors enhance the number of possible targets for attacks against computer networks. Hacking, Viruses, Worms and Trojan horses are some of the major attacks that panic any network systems. However, the increasing dependency on computer networks has increased in order to secure the information that could be reached by them. Along with the conventionally used security tools like firewalls, intrusion detection systems (IDS) are becoming of supreme significance. Intrusion Detections Systems (IDS) is a new path of security systems, which provides efficient approaches to secure computer networks. Artificial Intelligence approaches have been used enormously to produce a lot of IDS. Some of these approaches rely on Genetic Algorithms to provide the network with an efficient classifier to recognize and detect intrusions actions. In the following sections, IDS systems are briefly defined and explained, the next section goes briefly on AIS to give an introduction of the following section which defines the use of genetic algorithms in ID. At the end, put this all together by presenting a brief on two different system case studies that uses approaches using GA for IDS. 5

6 Chapter 1 Intrusion Detection Systems (IDS) Intrusion Detection The first line of defence in securing a networked system is detecting an attack, i.e. Intrusion Detection (ID). Different techniques and methods in areas in computer and information systems were used for Intrusion Detection which mainly falls under the following areas: 1. Artificial Intelligence Most of the basic most effective methods and researches in Intrusion detection rely on Artificial Intelligence systems and ideas. Such as the following: a. A lot of researchers are interested in applying rule based methods for intrusion detection, such as Data mining which uses the association rule. b. Fuzzy logic concepts gain also a major interest. Some researchers used multi-disciplinary approach such as combined fuzzy logic, genetic algorithm and association rule techniques in their work. c. ANN (Artificial Neural Networks) approach provides an unsupervised classification method to overcome the drawbacks of dimensionality for a large number of input features. (This will be further discussed in chapter 2) 2. Software Engineering Many papers focused on how to implement and develop intrusion detection and proposed frameworks in this area, but basically the implementation of IDS fall into two main approaches. a. Software implementation where IDS is deployed in the host or server which cost effective but increase the overhead on the host processor. b. IDS implementation on hardware platform to monitor and analyse intrusions in the networks. This way is more efficient and accurate but somehow expensive. 3. Embedded Programming In order to reduce the load on the IDS, some embedded Hardware parts could be added with pre-process information about the networks such as the programming the Network Interface Card to detect some major attacks such as Denial of Service attack (DoS). 4. Distributed or Agent Based Intrusion Detection 6

7 [6][35] It is a way of dividing the workload among distributed machines in the network but also the IDS will be able to obtain an overall knowledge of the networks working condition. To detect the intrusion more accurately and at the same time it can respond to the threats more effectively. An agent for the intrusion detection system uses a machine learning approach to automated discovery of concise rules from system call traces. A rule learning algorithm is then used to induce rules that can be used to monitor the system and detect potential intrusions. IDS Design Principles IDS are designed and implemented on modelled networked systems. Several points should be predefined and stated, in order to find a proper model for the network: Normal behaviour of a network system is the most dominant and frequent behaviour of the network in a certain time period. Anomaly within the network system least frequent and abnormal behavior of the network at a certain time period. Modeling a dynamic and complex system such as the network is very difficult, for this reason, abstraction and partial modeling are used as a good solution. The whole network components could be divided to: host, user and network environment, and the user itself could be divided into legitimate user and malicious user (intruder). Many other nested divisions could occur according to the designers point of view and the areas of focus. An Intruder detection system basically raises an alarm whenever an anomaly event occurs, which could be caused by an intruder to the system. These systems do not react equally at all times, false alarms could occur sometime and this is called False Positive (FP). The lower value of FP gives a higher value of the IDS. [6][23] IDS Design Trends There are number of different was to classify IDS in order to distinguish between their different types. The most generic classification I found for IDS is: 1. Analysis approach 2. Placement of IDS Under each of these categories several classifications could occur. [1] 1. Analysis Approach Boer and Pels in [11], gave three types of IDS which could be listed under this appraoch: NIDS: Network-based IDS which monitors the network for malicious traffic. 7

8 HIDS: Host-based IDS which monitors the activities of a single host DIDS: Distributed IDS correlate events from different Host- or Network based IDS They mainly focused on the HIDS, and gave four common methods used in that area defining the features, installation and maintainability details, techniques of evading the IDS and their own perspective on each of the methods listed: File system monitors, Log file analysis, Connection analysis and Kernel-base IDS. In [6] a similar division was mentioned but other most of the other references such as [5] and [22] did not consider DIDS. 2. Placement of IDS In this respect IDS are usually divided into: SIDS: Signature-based IDS, which studies the attacks patterns and defines a signature for it, to enable security specialists to design a defence against that attack. AIDS: Anomaly-based IDS, which learns the usual behaviour of a network patterns, and suspects an attack once an anomaly occurs. The mentioned above are the most known, where some researchers come up with a hybrid approach that combines the benefits of them and focuses on reducing the average of FP alarms occurrences. In [6] another type was mentioned which is Specification-based IDS which is recently introduced by researchers which specially focuses on reducing the number of FP alarms. 8

9 Chapter 2 Artificial Intelligence and Intrusion Detection Artificial Intelligence Systems There is no basic, simple, or agreed upon strict definition of artificial intelligence however as a general definition artificial intelligence is the science and engineering of making intelligent machines, especially intelligent computer programs. [2] Human s biological intelligence has inspired system security designers and researchers to build artificial intelligence system which emulates the defence mechanism of Human Immune Systems. Artificial Intelligence systems have been experienced and developed, which relies of the algorithms and intelligent techniques, combining the knowledge of past intrusions in improving the systems detection. [1][2][12] Regarding the Intrusion detection, most of the available researches basically focused on three types of Artificial Intelligence methods and techniques. 1. ANN (Artificial Neural Networks) Approach Artificial Neural Network (ANN) is a set of simply processing elements based on an animal neuron. Neurons are connected with communication channels, and information streams, in the form of numerical data between nodes. [2] The ability of interconnection between nodes is through weights that are changing elements which create a dynamic ANN environment. Similar to the human s neural systems, many inputs could inter a certain nerve in a parallel fashion; the inputs are summed with the weight to be used in a Transfer Function which gives the final output. ANN learning techniques are mainly divided into supervised or unsupervised according to the learning method used. Supervised method should reach a desired output, if not; the mathematical algorithms built in ANN will perform some adjustments until it reaches the expected output. The unsupervised learning is the opposite way of the former method, i.e. it is given a set of inputs and no correct output. In case of IDS these learning techniques are used to increase the system intelligence in distinguishing between normal and intruder behaviours. 9

10 2. Fuzzy Logic Fuzzy Logic was introduced as a means to the model of uncertainty of natural language. And due to the uncertainty nature of intrusions fuzzy sets are strongly used in discovering attack events and reducing the rate of false alarms at the same time. Basically, intrusion detection systems distinguish between two distinct types of behaviours, normal and abnormal, which create two distinct sets of rules and information. Fuzzy logic could create sets that have in-between values where the differences between the two sets are not well defined. In this case the logic depends on linguistics by taking the minimum of set of events or maximum instead of stating OR, AND or NOT operation in the if-then-else condition. This feature strongly participates in reducing the false positive alarm rates in the system. [12][24] 3. Genetic Algorithms A Genetic Algorithm (GA) is a programming technique that mimics biological evolution as a problem-solving strategy. [2] It is based on Darwinian s principle of evolution and survival of fittest to optimize a population of candidate solutions towards a predefined fitness. [16][18] GA uses an evolution and natural selection that uses a chromosome-like data structure and evolve the chromosomes using selection, recombination, and mutation operators. The process usually begins with randomly generated population of chromosomes, which represent all possible solution of a problem that are considered candidate solutions. Different positions of each chromosome are encoded as bits, characters or numbers. These positions could be referred to as genes. An evaluation function is used to calculate the goodness of each chromosome according to the desired solution, this function is known as Fitness Function. During evaluation, two basic operators, crossover and mutation, are used to simulate the natural reproduction and mutation of species. The selection of chromosomes for survival and combination is biased towards the fittest chromosomes. [16][18][20][31][3] The following figure taken from [16] shows the structure of a simple genetic algorithm. Starting by a random generation of initial population, then evaluate and evolve through selection, recombination, and mutation. Finally, the best individual (chromosome) is picked out as the final result once the optimization meet it target (Pohlheim, 2001). 10

11 Figure 1 : Structure of Simple GA [16] Many authors and researchers are highly motivated to Genetic Algorithms as a strong and efficient method used in different field in Artificial Intelligence, noting that several AI techniques could be combined in different ways in different systems for several purposes. 11

12 Chapter 3 Using Genetic Algorithms in Intrusion Detection Systems The genetic algorithm is employed to derive a set of classification rules from network audit data, and the support-confidence framework is utilized as fitness function to judge the quality of each rule. The generated rules are then used to detect or classify network intrusions in a real-time environment. [8] A Generic GA-based intrusion detection approach As a conclusion of what previously presented of AI based IDS, these systems work is divided into two main stages. Fist the training stage which provides the system with necessary information required initially, after that the next step is the detection stage where the system detects intrusions according to what was learned in the previous step. Applying this in GA based IDS; the GA is trained with classification rules learned from previous network audit data. The second stage is applied in a real-time manner by classifying the incoming network connections according to the generated rules. Many systems have been proposed in a lot of researches in either simple or advanced fashion, but to give a general idea of the components of the system and basic mechanism of it; the three following components will be highlighted: 1- Data Representation Genes should be represented in some format using different data types such as byte, integer and float. Also they may have different data ranges and other features, knowing that the genes are generated randomly, in each population generating iteration. Genetic algorithms can be used to evolve rules for the network traffic; these rules are usually in the following form: If {condition} then {act} [16] It basically contains if-then clause, a condition and an act. The conditions usually matches the current network behaviour with the one stored in the in the IDS such as comparing an intruder source IP address and port number with one already stored in the system. The act could be an alarm indicating that the intruders IP and Port numbers are related to an attacker who is previously known in the system. [16][8] 12

13 2 - GA Parameters GA has some common elements and parameters which should be defined: Fitness Function is defined according to [2], The fitness function is defined as a function which scales the value individual relative to the rest of population. It computes the best possible solutions from the amount of candidates located in the population. GA Operators According to the figure below we could see that the selection mutation and crossover are the most effective parts in the algorithm as they are they participate in the generation of each population. Figure 2 : The operation of GA [8] Selection is the phase where population individuals with better fitness are selected, otherwise it gets damaged. Crossover is a process where each pair of individuals selects randomly participates in exchanging their parents with each other, until a total new population has been generated. Mutation flips some bits in an individual, and since all bits could be filled, there is low probability of predicting the change. 3- Detection algorithm overview In [8], a generic algorithm has been presented which contains a training process. This algorithm is designed to apply set of classification rules according to the input data given. It follows the simple flow of genetic algorithms presented in the Figure 2. [8][16][2] 13

14 Figure 3 : Algorithm [8] 14

15 Chapter 4 Proposed experiments on using GA in IDS Related work In [16], one basic experiment was proposed which was strongly related to the stated subject of this research, where the experiments proposed were simple using narrow sample of data. Chittur in [26] presented a Generic model for applying Genetic Algorithms for IDS, which successfully achieved about 97% of intrusion detection with significantly low rate of false alarms. Some papers presented models with slight improvements, such as tracing events of the log files in an off-line method to enhance the classification rules of GA [7], or apply improvements on the data structure of classifier, either linear [32] or using tree data structures [9]. General IDS applications and frameworks were also proposed using hybrid immune-systems combining several techniques together in [30, 40], while combining two or more AI techniques such as fuzzy Data mining and Genetic algorithms were presented in [28, 29]. In [25] an improvement of the systems which uses Fuzzy data mining and GA in IDS by applying parallel GA to overcome the slowness caused by the evaluation process. DIDS experiment was proposed using Genetic Programming assembles in [10]. Some proposed systems Several case studies and experiments were applied regarding the use of GA in IDS. Some went further in combining several AI methods to propose enhanced systems and performed several tests in this regards. In the following lines, an experiments presented by Susan M. Bridges and Rayford B. Vaughn in [28] will be highlighted, one using Fuzzy data mining approach and the other using Neural Networks. 1. Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection. In this paper, a prototype Intelligent Intrusion Detection System was developed to demonstrate the effectiveness of data mining techniques that utilize Fuzzy Logic and Genetic Programming. The system provides a high degree of detection for both anomaly and misuse. Genetic algorithms are used to tune the fuzzy membership function to improve performance and also to provide data mining components with the set of features from the audit data. The aim was to design and abstract IDS which is adaptive, accurate and flexible. In this experiment, GA was found very effective in selecting set of features to identify 15

16 different types of intrusions. The figure below was presented to conclude the final results they reached. Figure 4 : Results of Experiment [28]. 16

17 Conclusion In this review, Intrusion Detection System overview was presented, giving the different trends and technologies that could be used Artificial Intelligence methods are gaining the most interest nowadays regarding its ability to learn and evolve, which makes them more accurate and efficient in facing the enormous number of unpredictable attacks. One major technique was highlighted, was the use of Genetic Algorithms providing system classifiers with extra intelligence. Although a lot of researches interest focus on this area of IDS but other researches claim that IDS regardless of their types are not applicable enough for today s challenges, as it provides a reactive approach for system defence. In [13] a Proactive Process Monitor Approach has been discussed (PPM), highlighting its ability to being proactive against attacks rather than reactive. 17

18 References 1 Aickelin, U., J. Greensmith, and J. Twycross. "Immune System Approaches to Intrusion Detection - A Review ",Natural Computing, Springer, in print, 2007, pp XXX. 2 Bobor, V. "Efficient Intrusion Detection System Architecture Based on Neural Networks and Genetic Algorithms.", Department of Computer and Systems Sciences, Stockholm University / Royal Institute of Technology, KTH/DSV, Faraoun, K M., and A. Boukelif. "Genetic Programming Approach for Multi-Category Pattern Classification Applied to Network Intrusions Detection.", INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE, Vol. 3, No. 1, 2006 pp Zhang, J., and M. Zulkernine. "Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection",Symposium on Network Security and Information Assurance - Proc. of the IEEE International Conference on Communications (ICC), June 2006, Istanbul, Turkey. 6 Kabiri, P., and Ali A. Ghorban. "Research on Intrusion Detection and Response: a Survey."International Journal of network security, The Intelligent & Adaptive Systems Group (IAS),Vol. 1, No. 2, 4 July 2005, pp Diaz-Gome, P. A., and D. F. Hougen. "IMPROVED OFF-LINE INTRUSION DETECTION USING a GENETIC ALGORITHM.",Proceedings of the Seventh International Conference on Enterprise Information Systems, 2005, Miami, USA. 8 Gong, R.H., M. Zulkernine, P. Abolmaesumi, "A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection," Proceedings of Sixth IEEE ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD),May 2005, Maryland,USA. 9 Stein, G., B. Chen, A. S. Wu, and Kien A. Hua. "Decision tree classifier for network intrusion detection with GA-based feature selection.", In the Proceedings of the 43rd ACM Southeast Conference, March 18-20, 2005, Kennesaw, GA,. 18

19 10 Folino, G., C. Pizzuti, G. Spezzano, GP Ensemble for Distributed Intrusion Detection Systems, International Conference on Advances in Pattern Recognition, ICAPR05, August 22-25, 2005, Bath, UK. 11 De Boer, P., and Martin Pels,"Host-Based Intrusion Detection Systems.", Technical Report:1.10, Faculty of Science, Informatics Institute, University of Amsterdam, Yao, J. T., S.L. Zhao, and L.V. Saxton, A study on fuzzy intrusion detection, Proceedings of SPIE Vol. 5812, Data Mining, Intrusion Detection, Information Assurance, And Data Networks Security, 28 March - 1 April 2005, Orlando, Florida, USA. 13 Bradford, P. G., and N. Hu. "A Layered Approach to Insider Threat Detection and Proactive Forensics. 21st Annual Computer Security Applications Conference, Applied Computer Security Associates (ACSA),December 5-9, 2005, Tucson, Arizona 15 Brugger, S. T. "Data Mining Methods for Network Intrusion Detection.", Terry Brugger's Homepage. 9 June University of California, Davis. 6 Oct < 16 Li, W., "Using Genetic Algorithm for Network Intrusion Detection," Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference, May 24-27, 2004, Kansas City, Kansas, USA. 18 Marczyk, A. "Genetic Algorithms and Evolutionary Computation.", The Talk, Origins Archive. 23 Apr Oct < 20 Song, D., " A LINEAR GENETIC PROGRAMMING APPROACH TO INTRUSTION DETECTION.", Master Degree for Computer Scinces, Genetic and Evolutionary Computation GECCO Smith, L. S. "An Introduction to Neural Networks." Professor Leslie S. Smith, Centre for Cognitive and Computational Neuroscience. 2 Apr Oct < 22 Coull, S., Joel Branch, Boleslaw Szymanski, and Eric Breimer. "Intrusion Detection: a Bioinformatics Approach.", Proceedings of the 19th Annual Computer Security Applications Conference, Dec. 2003, Las Vegas, Nevada. 23 Gorodetsky,V., I.Kotenko, and O.Karsaev." Multi-agent Technologies for Computer Network Security: Attack Simulation, Intrusion Detection and Intrusion Detection Learning.", 19

20 International Journal of Computer Systems Science and Engineering. vol.18, No.4, July 2003, pp Gomez, J., and D. Dasgupta. "Evolving Fuzzy Classifiers for Intrusion Detection.", Proceedings of the 2002 IEEE, Workshop on Information Assurance, United States Military Academy, June 2001,West Point, NY. 25 Liu, Q., S. Bridges and I. Banicescu, "Parallel genetic algorithms for tuning a fuzzy data mining system.", In Proceedings of the Artificial Neural Networks in Engineering Conference (ANNIE 2001), November 4-7, 2001, St. Louis, MO. 26 Chittur, A., "Model Generation for an Intrusion Detection System Using Genetic Algorithms., High School Honors Thesis, Ossining High School,Ossining, NY., 27 Nov, Dasgupta,D., and F.A. Gonzalez, "An Intelligent Decision Support System for Intrusion Detection and Response.", In Lecture Notes in Computer Science (publsher: Springer-Verlag) as the proceedings of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS), May 21-23, 2001, pp 1-14, St. Petersburg, Russia. 28 Bridges, S. M., and R. M. Vaughn, Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection, Proceedings of the Twenty-third National Information Systems Security Conference, October 2000, Baltimore, MD. 29 Wang, W., and S.M. Bridges, Genetic Algorithm Optimization of Membership Functions for Mining Fuzzy Association Rules, Proceedings of the 7th International Conference on Fuzzy Theory & Technology, February 27 March 3, 2000, pp , Atlantic City, NJ. 30 Dasgupta, D., "Immunity-Based Intrusion Detection System: a General Framework.", 22nd National Information Systems Security Conference, The University of Memphis, 1999, Virginia, USA 31 Sinclair,C.,L.Pierce, S. Matzner,"An Application of Machine Learning to Network Intrusion Detection", Proceedings of the 15th Annual Computer Security Applications Conference, December 1999, page 371, Phoenix, AZ. 32 Mukkamala, S., A. H. Sung, and A. Abrham, "Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach.", RML Technologies, Inc. Oct

21 35 Helmer, G., J. Wong, V. Honavar, and L. Miller, "Automated Discovery of Concise Predictive Rules for Intrusion Detection.", Recursions Software Inc. Ames, IA: Department of Computer Science Iowa State University Ames, IA, Marin, J. A., D. Ragsdale, and J. Surdu, "A Hybrid Approach to Profile Creation and Intrusion Detection.", Information Technology and Operations Centre, United States Military Academy, Information Technology and Operations Centre. 21

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet

More information

A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection

A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi School of Computing Queen s University Kingston, Ontario,

More information

D A T A M I N I N G C L A S S I F I C A T I O N

D A T A M I N I N G C L A S S I F I C A T I O N D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.

More information

A Survey on Intrusion Detection System with Data Mining Techniques

A Survey on Intrusion Detection System with Data Mining Techniques A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

USING GENETIC ALGORITHM IN NETWORK SECURITY

USING GENETIC ALGORITHM IN NETWORK SECURITY USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:

More information

CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC

CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC ABSTRACT CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC Mostaque Md. Morshedur Hassan LCB College, Maligaon, Guwahati, Assam, India. mostaq786@gmail.com Nowadays Intrusion

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications

An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications International Journal of Computer Science and Telecommunications [Volume 5, Issue 2, February 2014] 20 An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications

More information

Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic

Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic Mostaque Md. Morshedur Hassan Assistant Professor, Department of Computer Science and IT, Lalit Chandra Bharali College, Guwahati,

More information

Using Genetic Algorithm for Network Intrusion Detection

Using Genetic Algorithm for Network Intrusion Detection Using Genetic Algorithm for Network Intrusion Detection Wei Li Department of Computer Science and Engineering Mississippi State University, Mississippi State, MS 39762 Email: wli@cse.msstate.edu Abstract

More information

Network Based Intrusion Detection Using Honey pot Deception

Network Based Intrusion Detection Using Honey pot Deception Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.

More information

Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.

Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.

More information

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA Panel Chair: Dr. Susan M. Bridges, Mississippi State University Panelists: Dr. Blaine W. Burnham, Georgia Tech Dr. Dipankar Dasgupta,

More information

Applying Genetic Algorithm to Intrusion Detection System

Applying Genetic Algorithm to Intrusion Detection System Applying Genetic Algorithm to Intrusion Detection System Vrishali Yewale 1, Vimla Jethani 2, Tushar Ghorpade 3 1 Computer Science Department, Mumbai University, RAIT College of Engineering, Nerul, Navi

More information

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges Bridges@cs.msstate.edu Rayford B. Vaughn vaughn@cs.msstate.edu 23 rd National Information Systems Security Conference

More information

Performance Evaluation of Intrusion Detection Systems

Performance Evaluation of Intrusion Detection Systems Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection

More information

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal

More information

A survey on Data Mining based Intrusion Detection Systems

A survey on Data Mining based Intrusion Detection Systems International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion

More information

Role of Anomaly IDS in Network

Role of Anomaly IDS in Network Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

SURVEY OF INTRUSION DETECTION SYSTEM

SURVEY OF INTRUSION DETECTION SYSTEM SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT

More information

Programming Risk Assessment Models for Online Security Evaluation Systems

Programming Risk Assessment Models for Online Security Evaluation Systems Programming Risk Assessment Models for Online Security Evaluation Systems Ajith Abraham 1, Crina Grosan 12, Vaclav Snasel 13 1 Machine Intelligence Research Labs, MIR Labs, http://www.mirlabs.org 2 Babes-Bolyai

More information

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

A Proposed Architecture of Intrusion Detection Systems for Internet Banking A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India Mehra_priti@yahoo.com

More information

Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms

Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms IJCSNS International Journal of Computer Science and Network Security, VOL.8 No., February 8 7 Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms Y.Dhanalakshmi and Dr.I. Ramesh

More information

An Artificial Immune Model for Network Intrusion Detection

An Artificial Immune Model for Network Intrusion Detection An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics

More information

Computational intelligence in intrusion detection systems

Computational intelligence in intrusion detection systems Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick Chang @ TEIL Reference The use of computational intelligence in intrusion detection systems : A review

More information

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

Self-Defending Approach of a Network

Self-Defending Approach of a Network Self-Defending Approach of a Network Anshuman Kumar 1, Abhilash Kamtam 2, Prof. U. C. Patkar 3 (Guide) 1Bharati Vidyapeeth's College of Engineering Lavale, Pune-412115, India 2Bharati Vidyapeeth's College

More information

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor

More information

Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks

Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks Distributed Sensor Networks, Article ID 351047, 6 pages http://dx.doi.org/10.1155/2013/351047 Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks

More information

Efficient Security Alert Management System

Efficient Security Alert Management System Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,

More information

Network Based Intrusion Detection System using Genetic Algorithm: A Study

Network Based Intrusion Detection System using Genetic Algorithm: A Study Network Based Intrusion Detection System using Genetic Algorithm: A Study 1 Purushottam Patil, 2 Dr. Yogesh Sharma and 3 Dr. Manali Kshirsagar 1 Research Scholar (Computer Science & Engineering), Faculty

More information

GA as a Data Optimization Tool for Predictive Analytics

GA as a Data Optimization Tool for Predictive Analytics GA as a Data Optimization Tool for Predictive Analytics Chandra.J 1, Dr.Nachamai.M 2,Dr.Anitha.S.Pillai 3 1Assistant Professor, Department of computer Science, Christ University, Bangalore,India, chandra.j@christunivesity.in

More information

Numerical Research on Distributed Genetic Algorithm with Redundant

Numerical Research on Distributed Genetic Algorithm with Redundant Numerical Research on Distributed Genetic Algorithm with Redundant Binary Number 1 Sayori Seto, 2 Akinori Kanasugi 1,2 Graduate School of Engineering, Tokyo Denki University, Japan 10kme41@ms.dendai.ac.jp,

More information

Research of distributed IDS based on mobile agent and genetic algorithm

Research of distributed IDS based on mobile agent and genetic algorithm Research of distributed IDS based on mobile agent and genetic algorithm Abstract Weimin Gao 1*, Lizhen Xiao 2 1 School of computer and information science, Hunan institute of technology, Heng yang 421002,

More information

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,

More information

KEITH LEHNERT AND ERIC FRIEDRICH

KEITH LEHNERT AND ERIC FRIEDRICH MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They

More information

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing Partha Ghosh, Ria Ghosh, Ruma Dutta Abstract: The massive jumps in technology led to the expansion of Cloud Computing

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap

Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security

More information

Improving Hypervisor-Based Intrusion Detection in IaaS Cloud for Securing Virtual Machines

Improving Hypervisor-Based Intrusion Detection in IaaS Cloud for Securing Virtual Machines Improving Hypervisor-Based Intrusion Detection in IaaS Cloud for Securing Virtual Machines 1 Shabnam Kazemi, 2 Vahe Aghazarian, 3 Alireza Hedayati 1 Department of Computer, Kish International Branch, Islamic

More information

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering

More information

Intrusion Detection for Mobile Ad Hoc Networks

Intrusion Detection for Mobile Ad Hoc Networks Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering tchen@engr.smu.edu http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems

More information

Network Intrusion Detection Systems

Network Intrusion Detection Systems Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection

More information

How To Prevent Network Attacks

How To Prevent Network Attacks Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu) Electrical and Computer Engineering Department Iowa State University

More information

A Novel Solution on Alert Conflict Resolution Model in Network Management

A Novel Solution on Alert Conflict Resolution Model in Network Management A Novel Solution on Alert Conflict Resolution Model in Network Management Yi-Tung F. Chan University of Wales United Kingdom FrankChan2005@gmail.com Ramaswamy D.Thiyagu University of East London United

More information

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders

More information

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016 Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00

More information

A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS

A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department

More information

Computer Worm Attack Using IDS and Trace Back Approaches

Computer Worm Attack Using IDS and Trace Back Approaches Computer Worm Attack Using IDS and Trace Back Approaches Sanjay Misra and Akuboh Victor Uneojo Abstract Computer worms pose a great threat to business enterprise, large/small organization, government agencies

More information

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems

More information

Intelligent Modeling of Sugar-cane Maturation

Intelligent Modeling of Sugar-cane Maturation Intelligent Modeling of Sugar-cane Maturation State University of Pernambuco Recife (Brazil) Fernando Buarque de Lima Neto, PhD Salomão Madeiro Flávio Rosendo da Silva Oliveira Frederico Bruno Alexandre

More information

NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL

NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL Prof. Santosh T. Waghmode 1, Prof. Vinod S. Wadne 2 Department of Computer Engineering, 1, 2 JSPM s Imperial College of Engineering

More information

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION. Abstract

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION. Abstract FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges, Associate Professor Rayford B. Vaughn, Associate Professor Department of Computer Science Mississippi State University

More information

A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING. Mahmood Hossain and Susan M. Bridges

A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING. Mahmood Hossain and Susan M. Bridges A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING Mahmood Hossain and Susan M. Bridges Department of Computer Science Mississippi State University, MS 39762, USA E-mail: {mahmood,

More information

A Biologically Inspired Approach to Network Vulnerability Identification

A Biologically Inspired Approach to Network Vulnerability Identification A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced

More information

A Review on Network Intrusion Detection System Using Open Source Snort

A Review on Network Intrusion Detection System Using Open Source Snort , pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India Sharmasakshi1009@gmail.com,

More information

Web Forensic Evidence of SQL Injection Analysis

Web Forensic Evidence of SQL Injection Analysis International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University

More information

Radware s Behavioral Server Cracking Protection

Radware s Behavioral Server Cracking Protection Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information

More information

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection

More information

A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM

A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM Walid Mohamed Alsharafi and Mohd Nizam Omar Inter Networks Research Laboratory, School of Computing, College

More information

Performance Evaluation of Intrusion Detection Systems using ANN

Performance Evaluation of Intrusion Detection Systems using ANN Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,

More information

Intrusion Detection Systems vs. Intrusion Prevention Systems. Sohkyoung (Michelle) Cho ACC 626

Intrusion Detection Systems vs. Intrusion Prevention Systems. Sohkyoung (Michelle) Cho ACC 626 Intrusion Detection Systems vs. Intrusion Prevention Systems Sohkyoung (Michelle) Cho ACC 626 1.0 INTRODUCTION An increasing number of organizations use information systems to conduct their core business

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

Computational Intelligence for Network Intrusion Detection: Recent Contributions

Computational Intelligence for Network Intrusion Detection: Recent Contributions Computational Intelligence for Network Intrusion Detection: Recent Contributions Asim Karim Dept. of Computer Science, Lahore University of Management Sciences, Opp. Sector U, DHA, Lahore 54792, Pakistan

More information

Network Intrusion Simulation Using OPNET

Network Intrusion Simulation Using OPNET Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,

More information

Two State Intrusion Detection System Against DDos Attack in Wireless Network

Two State Intrusion Detection System Against DDos Attack in Wireless Network Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.

More information

Intrusion Detection using Artificial Neural Networks with Best Set of Features

Intrusion Detection using Artificial Neural Networks with Best Set of Features 728 The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 Intrusion Detection using Artificial Neural Networks with Best Set of Features Kaliappan Jayakumar 1, Thiagarajan Revathi

More information

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts

More information

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering

More information

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)

More information

Credit Card Fraud Detection Using Self Organised Map

Credit Card Fraud Detection Using Self Organised Map International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud

More information

Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques

Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques www.ijcsi.org 387 Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques Utkarsh Dixit 1, Shivali Gupta 2 and Om Pal 3 1 School of Computer Science, Centre

More information

Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model

Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Trung Le 1, Ba Quy Tran 2, Hanh Dang Thi My 3, Thanh Hung Ngo 4 1 GSR, Information System Lab., University of

More information

Denial-Of -Service Attack Detection Using KDD

Denial-Of -Service Attack Detection Using KDD Denial-Of -Service Attack Detection Using KDD Prof. Pankaj Salunkhe 1,Mayur Shishupal 2 1 Head of Department (Electronics & Telecommunication Engineering), YTIET, Bhivpuri [MH], India 2 Pursuing Master

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection

An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection German Florez, Susan M. Bridges, and Rayford B. Vaughn Abstract We have been using fuzzy data mining techniques to extract patterns that

More information

Intrusion Detection System using Log Files and Reinforcement Learning

Intrusion Detection System using Log Files and Reinforcement Learning Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT

More information

Observation and Findings

Observation and Findings Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network

More information

Detecting Denial of Service Attacks Using Emergent Self-Organizing Maps

Detecting Denial of Service Attacks Using Emergent Self-Organizing Maps 2005 IEEE International Symposium on Signal Processing and Information Technology Detecting Denial of Service Attacks Using Emergent Self-Organizing Maps Aikaterini Mitrokotsa, Christos Douligeris Department

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs Intrusion Detection Systems Oussama El-Rawas History and Concepts of IDSs Overview A brief description about the history of Intrusion Detection Systems An introduction to Intrusion Detection Systems including:

More information

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots Journal of Advances in Computer Research Quarterly ISSN: 2008-6148 Sari Branch, Islamic Azad University, Sari, I.R.Iran (Vol. 3, No. 1, February 2012), Pages: 65-79 www.jacr.iausari.ac.ir Avoiding Cyber-attacks

More information

Journal of Internet Banking and Commerce

Journal of Internet Banking and Commerce Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, December 2009, vol. 14, no.3 (http://www.arraydev.com/commerce/jibc/)

More information

An Application of Machine Learning to Network Intrusion Detection

An Application of Machine Learning to Network Intrusion Detection An Application of Machine Learning to Network Intrusion Detection Chris Sinclair Applied Research Laboratories The University of Texas at Austin sinclair@arlututexasedu Lyn Pierce epierce@arlututexasedu

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions

More information

Taxonomy of Hybrid Honeypots

Taxonomy of Hybrid Honeypots 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore Taxonomy of Hybrid Honeypots Hamid Mohammadzadeh.e.n 1, Masood Mansoori 2 and Roza

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information