Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic
|
|
|
- Deirdre Price
- 10 years ago
- Views:
Transcription
1 Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic Mostaque Md. Morshedur Hassan Assistant Professor, Department of Computer Science and IT, Lalit Chandra Bharali College, Guwahati, India ABSTRACT: These days Intrusion Detection System (IDS) which is defined as a solution of system security is employed to identify the abnormal activities in a computer system or network. So far different approaches have been utilized in intrusion detections, but unluckily any of the systems is not entirely ideal. Hence, the hunt of improved method goes on. In this progression, here I have designed an Intrusion Detection System (IDS), by applying genetic algorithm (GA) and fuzzy logic to efficiently detect various types of the intrusive activities within a network. The proposed fuzzy logic-based system could be able to detect the intrusive activities of the computer networks as the rule base holds a better set of rules. The experiments and evaluations of the proposed intrusion detection system are performed with the KDD Cup 99 intrusion detection benchmark dataset. The experimental results clearly show that the proposed system achieved higher accuracy rate in identifying whether the records are normal or abnormal ones and obtained reasonable detection rate. Keywords: Intrusion Detection System (IDS), Anomaly Based Intrusion Detection, Genetic Algorithm, Fuzzy Logic, KDD Cup 99 Dataset. I. INTRODUCTION Intrusion detection is designed to monitor the malicious activities ([1], [2], [3],[4]) occurring in a computer system or network inside or outside and analysing them for signs of possible incidents, which are violations or forthcoming threats of violation of computer security policies, acceptable utilized policies, or standard security practices. Intrusion incidents to computer systems are increasing because of the commercialization of the internet and local networks [5] and new automated hacking tools. Computer systems are turning out to be more and more susceptible to attack, due to its extended network connectivity. Nowadays, networked computer systems play an increasingly important role in our society and its economy. They have become the targets of a wide array of malicious attacks that invariably turn into actual intrusions. This is the reason computer security has become an essential concern for network administrators. Too often, intrusions cause havoc inside LANs and the time and cost to repair the damage can grow to extreme proportions. Instead of using passive measures to fix and patch security holes once they have been exploited, it is more effective to adopt a proactive approach to intrusions. Intrusion Detection Systems (IDS) are primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators [6] in real-time, or near real-time, and those that process audit data with some delay (non-real-time). The latter approach would in turn delay the time of detection. In addition, organizations use IDSs for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies. IDSs have become a necessary addition to the security infrastructure of nearly every organization. IDSs typically record information related to observed events, notify security administrators of important observed events, and produce reports. Many IDSs can also respond to a detected threat by attempting to prevent it from succeeding. They use several response techniques, which involve the IDS stopping the attack itself, changing the security environment (e.g., reconfiguring a firewall), or changing the attack s content. A typical Intrusion Detection System is shown in figure 1. Copyright to IJIRCCE
2 Note: The arrow thickness represents the amount of information flowing from one component to another Figure 1: Very simple intrusion detection system One of the major problems faced by IDS is huge number of false positive alerts, i.e. alerts that are mistakenly classified normal traffic as security violations. A perfect IDS does not generate false or irrelevant alarms. In practice, signature based IDS found to produce more false alarms than expected. This is because of the very general signatures and lack of built in verification tool to validate the success of the attack. The huge amount of false positives in the alert log makes the process of taking remedial action for the true positives, i.e. successful attacks, delayed and labour intensive. My goal is to detect novel attacks by unauthorized users in network traffic. I consider an attack to be novel if the vulnerability is unknown to the target's owner or administrator, even if the attack is generally known and patches and detection tests are available. I am primarily interested in four types of remotely launched attacks: probes, denial of service (DOS), U2R and R2L. A DoS attack is a type of attack in which the hacker makes a computing or memory resources too busy or too full to serve legitimate networking requests and hence denying users access to a machine e.g. apache, smurf, neptune, ping of death, back, mail bomb, UDP storm etc. are all DoS attacks. A remote to user (U2R) attack is an attack in which a user sends packets to a machine over the internet, which he/she does not have access to in order to expose the machines vulnerabilities and exploit privileges which a local user would have on the computer e.g. xlock, guest, xnsnoop, phf, sendmail dictionary etc. A R2L attacks are exploitations in which the hacker starts off on the system with a normal user account and attempts to abuse vulnerabilities in the system in order to gain super user privileges e.g. perl, xterm. A probing is an attack in which the hacker scans a machine or a networking device in order to determine weaknesses or vulnerabilities that may later be exploited so as to compromise the system. This technique is commonly used in data mining e.g. saint, portsweep, mscan, nmap etc. II. RELATED WORKS The normal and abnormal behaviours [1] in networked computers are hard to predict, as the boundaries cannot be well defined. This prediction process usually generates fake alarms in many anomaly based intrusion detection systems. With the introduction of fuzzy logic, the fake alarm rate in determining intrusive behaviour can be reduced, where a set of fuzzy rules is used to define the normal and abnormal behaviour [1] in a computer network. This system proposed a technique to generate fuzzy rules that are able to detect malicious activities and some specific intrusions. Copyright to IJIRCCE
3 This system presented an approach for the performance of generated fuzzy rules in classifying different types of intrusions. In this system, I explained the attack modes and point to the impact of this attack and its threats. From an attacker s perspective, I analyse each of the attack s modes, benefits and suitable conditions and think how to improve the attack by introducing the concept of fuzzy logic-based technique. Fuzzy set theory was introduced by Zadeh [10] in 1965 and it was specifically designed mathematically represent uncertainty and vagueness with formalized logical tools for dealing with the imprecision inherent in many real world problems. Hassan [4], Baruah ([7], [8]), Neog and Sut [9] have forwarded an extended definition of fuzzy set which enables us to define the complement of a fuzzy set. Our proposed system agrees with them as this new definition satisfies all the properties regarding the complement of a fuzzy set. Gong [2] presented an implementation of GA based approach to Network Intrusion Detection using GA and showed software implementation. The approach derived a set of classification rules and utilizes a support-confidence framework to judge fitness function. Xia, Hariri and Yousif [3] used GA to detect anomalous network behaviours based on information theory ([17], [18]). Some network features can be identified with network attacks based on mutual information between network features and type of intrusions and then using these features a linear structure rule and also a GA is derived. The approach of using mutual information and resulting linear rule seems very effective because of the reduced complexity and higher detection rate. The only problem is that it considered only the discrete features. Abdullah [6] showed a GA based performance evaluation algorithm to network intrusion detection. The approach uses information theory for filtering the traffic data. Lu and Traore [12] used historical network dataset using GP to derive a set of classification [17]. They used support-confidence framework as the fitness function and accurately classified several network intrusions. But their use of genetic programming made the implementation procedure very difficult and also for training procedure more data and time is required. Goyal and Kumar [13] described a GA based algorithm to classify all types of smurf attack using the training dataset with false positive rate is very low (at 0.2%) and detection rate is almost 100%. Li [14] described a method using GA to detect anomalous network intrusion ([17], [18]). The approach includes both quantitative and categorical features of network data for deriving classification rules. However, the inclusion of quantitative feature can increase detection rate but no experimental results are available. III. INTRUSION DETECTION OVERVIEW The following sections give a short overview of networking attacks, classifications and various components of Intrusion Detection System. A. NETWORKING ATTACKS This section is an overview of the four major categories of networking attacks. Every attack on a network can comfortably be placed into one of these groups [15] Denial of Service (DoS): A DoS attack is a type of attack in which the hacker makes a computing or memory resources too busy or too full to serve legitimate networking requests and hence denying users access to a machine e.g. apache, smurf, neptune, ping of death, back, mail bomb, UDP storm etc. are all DoS attacks. Remote to User Attacks (R2L): A remote to user attack is an attack in which a user sends packets to a machine over the internet, which he/she does not have access to in order to expose the machines vulnerabilities and exploit privileges which a local user would have on the computer e.g. xlock, guest, xnsnoop, phf, sendmail dictionary etc. Copyright to IJIRCCE
4 User to Root Attacks (U2R): These attacks are exploitations in which the hacker starts off on the system with a normal user account and attempts to abuse vulnerabilities in the system in order to gain super user privileges e.g. perl, xterm. Probing: Probing is an attack in which the hacker scans a machine or a networking device in order to determine weaknesses or vulnerabilities that may later be exploited so as to compromise the system. This technique is commonly used in data mining e.g. saint, portsweep, mscan, nmap etc. B. CLASSIFICATION OF INTRUSION DETECTION Intrusions Detection can be classified into two main categories. They are as follow: Host Based Intrusion Detection: HIDSs evaluate information found on a single or multiple host systems, including contents of operating systems, system and application files ([11], [16]). Network Based Intrusion Detection: NIDSs evaluate information captured from network communications, analysing the stream of packets which travel across the network ([11], [16]). C. COMPONENTS OF INTRUSION DETECTION SYSTEM An intrusion detection system normally consists of three functional components [17]. The first component of an intrusion detection system, also known as the event generator, is a data source. Data sources can be categorized into four categories namely Host-based monitors, Network-based monitors, Application-based monitors and Target-based monitors. The second component of an intrusion detection system is known as the analysis engine. This component takes information from the data source and examines the data for symptoms of attacks or other policy violations. The analysis engine can use one or both of the following analysis approaches: Misuse/Signature-Based Detection: This type of detection engine detects intrusions that follow Ill-known patterns of attacks (or signatures) that exploit known software vulnerabilities ([18], [19]). The main limitation of this approach is that it only looks for the known weaknesses and may not care about detecting unknown future intrusions [20]. Anomaly/Statistical Detection: An anomaly based detection engine will search for something rare or unusual [20]. They analyses system event streams, using statistical techniques to find patterns of activity that appear to be abnormal. The primary disadvantages of this system are that they are highly expensive and they can recognize an intrusive behaviour as normal behaviour because of insufficient data The third component of an intrusion detection system is the response manager. In basic terms, the response manager will only act when inaccuracies (possible intrusion attacks) are found on the system, by informing someone or something in the form of a response. IV. GENETIC BASED IDS A. GENETIC ALGORITHM OVERVIEW A Genetic Algorithm (GA) is a programming technique that uses biological evolution as a problem solving strategy [21]. It is based on Darwinian s principle of evolution and survival of fittest to optimize a population of candidate solutions towards a predefined fitness [14]. The proposed GA based intrusion detection system contains two modules where each works in a different stage. In the training stage, a set of classification rules are generated from network audit data using the GA in an offline environment. In the intrusion detection stage, the generated rules are used to classify incoming network connections in the real-time environment. Once the rules are generated, the intrusion detection system becomes simple, experienced and efficient one. GA uses an evolution and natural selection that uses a chromosome-like data structure and evolve the chromosomes using selection, recombination and mutation operators [14]. The process usually begins with randomly generated population of chromosomes, which represent all possible solution of a problem that are considered candidate solutions. From each chromosome different positions are encoded as bits, characters or numbers. These positions could be referred to as genes. An evaluation function is used to calculate the decency of each chromosome according to the Copyright to IJIRCCE
5 desired solution; this function is known as Fitness Function. During the process of evaluation Crossover is used to simulate natural reproduction and Mutation is used to mutation of species [14]. For survival and combination the selection of chromosomes is partial towards the fittest chromosomes. When I use GA for solving various problems three factors will have vital impact on the effectiveness of the algorithm and also of the applications [2]. They are: i) the fitness function; ii) the representation of individuals; and iii) the GA parameters. The determination of these factors often depends on implementation of the system. In the following sections, I focus our discussions on deriving the set of rules using Genetic Algorithm. B. FUZZY LOGIC It has been shown by Baruah [7] that a fuzzy number [a, b, c] is defined with reference to a membership function μ(x) lying between 0 and 1, a x c. Further, he has extended this definition in the following way. Let μ1(x) and μ2(x) be two functions, 0 μ2(x) μ1(x) 1. He has concluded μ1(x) the fuzzy membership function, and μ2(x) a reference function, such that (μ1(x) μ2(x)) is the fuzzy membership value for any x. Finally he has characterized such a fuzzy number by {x, μ1(x), μ2(x); x Ω}. The complement of µ x is always counted from the ground level in Zadehian s theory [10], whereas it actually counted from the level if it is not as zero that is the surface value is not always zero. If other than zero, the problem arises and then we have to count the membership value from the surface for the complement of µ x. Thus I could conclude the following statement Complement of µ x = 1 for the entire level Membership value for the complement of µ x = 1- µ x My system forwarded a definition of complement of an extended fuzzy set where the fuzzy reference function is not always zero. The definition of complement of a fuzzy set proposed by Hassan [4], Baruah ([7], [8]), Neog and Sut [9] could be seen a particular case of what I am giving. I shall use Baruah s definition of the complement of a normal fuzzy set in my article. In the two classes classification problem, there are two classes where every object should be classified. These classes are called positive (abnormal) and negative (normal). The data set used by the learning algorithms consists of a set of objects, each object with n+1 attributes. The first n attributes define the object characteristics (monitored parameters) and the last attribute defines the class that the object belongs to the classification attribute. A fuzzy classifier for solving the two class classification problem is a set of two rules, one for the normal class and other for the abnormal class, where the condition part is defined using only the monitored parameters and the conclusion part is an atomic expression for the classification attribute. C. FLOWCHART Figure 2 shows the operations of a general genetic algorithm according to which GA is implemented in our system. Copyright to IJIRCCE
6 Figure 2: Flowchart of Genetic Algorithm D. ALGORITHM OF THE PROPOSED SYSTEM Algorithm Rule set generation using GA Input Network audit data, number of generations, and population size Output A set of classification rules 1. initialize the population 2. generate random population 3. W1=0.2, W2=0.5, W3=0.3, T=0.5, chrom_length=9 4. N=total number of populations to be generated 5. for each chromosome in the population 6. TP=0, TN=0, FP=0, FN=0 7. for each record in the training set 8. if the record matches the chromosome 9. increment membership value of TP 10. end if 11. if the records do not match the chromosome 12. increment membership value of FP 13. end if 14. end for 15. Fitness=W1*TP/(TP+FN)+W2*FP/(FP+TN)+W3*(1-chrom_length/10) Copyright to IJIRCCE
7 16. if Fitness>T 17. if N<1 18. break 19. else 20. select the chromosome into the new population 21. update the total number of population 22. N=N end if 24. end if 25. end for 26. for each chromosome in the new population 27. apply crossover operator to the chromosome 28. apply mutation operator to the chromosome 29. end for 30. if the required number of generation is not reached, then go to step 5. E. FITNESS FUNCTION The authors in ([1], [4]) used the fuzzy confusion matrix to calculate the fitness of a chromosome. In the fuzzy confusion matrix the fuzzy truth degree of the condition represented by the chromosome and the fuzzy negation operator are used directly. In our case, the fitness of a chromosome for the abnormal class is evaluated according to the following set of equations: Where, Sensitivity = TP/(TP+FN) Specificity = FP/(FP+TN) Length = 1 chromosome_length/10 So finally Fitness of a chromosome is calculated as follows Fitness = W1 * Sensitivity + W2 * Specificity + W3 * Length Where, TP, TN, FP, FN are true positive, true negative, false positive, false negative value for the rule, p is the number of samples of the evolved class in the training data set, q is the number of samples of the remaining class in the training data set, predicted is the fuzzy value of the conditional part of the rule, class_data i is an element of the subset of the training samples of the evolved class, other_class_data i is an element of the subset of the remaining classes in the training samples, and W1, W2, W3 are the assigned weights for each rule characteristics respectively. V. IDS IMPLEMENTATION To implement the algorithm and to evaluate the performance of the system, I have used the standard dataset used in KDD Cup 1999 Computer network intrusion detection competition. Copyright to IJIRCCE
8 A. KDD CUP SAMPLE DATASET For the implementation of the proposed algorithm, I used the KDD 99 intrusion detection datasets which are based on the 1998 DARPA initiative, which provides designers of intrusion detection systems (IDS) with a benchmark on which to evaluate different methodologies ([22], [25]). Hence, a simulation is being made of a factitious military network with three target machines running various operating systems and services. They also used three additional machines to spoof different IP addresses for generate network traffic. A connection is a sequence of TCP packets starting and ending at some well defined times, between which data flows from a source IP address to a target IP address under some well defined protocol ([22], [23], [25]). It results in 41 features for each connection. Finally, there is a sniffer that records all network traffic using the TCP dump format [25]. The total simulated period is seven weeks. Normal connections are created to profile that expected in a military network and attacks fall into one of four categories: User to Root; Remote to Local; Denial of Service; and Probe. The KDD 99 intrusion detection benchmark consists of different components [24]: kddcup.data; kddcup.data_10_percent; kddcup.newtestdata_10_percent_unlabeled; kddcup.testdata.unlabeled; kddcup.testdata.unlabeled_10_percent; corrected. I have used kddcup.data_10_percent as training dataset and corrected as testing dataset. In this case the training set consists of 494,021 records among which 97,280 are normal connection records, while the test set contains 311,029 records among which 60,593 are normal connection records. Table 1 shows the distribution of each intrusion type in the training and the test set. Dataset Normal Probe Dos U2r R2l Total Train ( kddcup.data_10_percent ) Test ( corrected ) Table1: Distribution of intrusion types in datasets B. IMPLEMENTATION PROCEDURE In the calculation phase, I have made 23 groups of chromosomes according to training data. There were 23 (22+1) groups for each of attack and normal types presented in training data. Number of chromosomes in each group is variable and depends on the number of data and relationship among data in that group. Total number of chromosomes in all groups Ire tried to keep in reasonable level to optimize time consumption in testing phase. In the testing/detection phase, for each test data, an initial population is made using the data and occurring mutation in different features. This population is compared with each chromosomes prepared in training phase. Portion of population, which are more loosely related with all training data than others, are removed. Crossover and mutation occurs in rest of the population which becomes the population of new generation. The process runs until the generation size comes down to 1 (one). The group of the chromosome which is closest relative of only surviving chromosome of test data is returned as the predicted type. For the implementation, I have taken both continuous and discrete values from the extracted features of the datasets. VI. EXPERIMENT RESULTS AND ANALYSIS A. TRAINING AND TESTING DATA The KDD 99 intrusion detection datasets [24] is broadly used to evaluate IDSs. In this study, two subsets were extracted from the 1998 DARPA data and used as the training and testing datasets. Each record of the datasets consists of 9 network features and 1 manually assigned record type. Nine network features have been used in the GA [14], which are connection duration, protocol, flag, su_attempted, is_guest_login, same_srv_rate, dst_host_same_srv_rate, dst_host_srv_count, and count. Copyright to IJIRCCE
9 The record type indicates whether a record is a normal network connection or a particular network intrusion. Most network packets in the selected datasets are normal, and four kinds of network attacks are present: dos, probe, u2r, and r2l. B. EXPERIMENTS In the experiment, the system was trained with the training dataset, and the default fitness function and the GA parameters were used, i.e., w1=0.2, w2=0.5, w3=0.3, 10 genes of a chromosome, 2000 generations, 250 initial rules in the population, crossover rate of 0.5, two-point crossover, and mutation rate of When the training process was finished, the top 15 best quality rules were taken as the final classification rules. The rules were then used to classify the training data and the testing data respectively. The experimental results show that the proposed method resulted good detection rates when using the generated rules to classify the training data itself. The detection rates could be higher if the fitness function and the GA parameters were chosen more appropriately. The results are presented in Table 2. Actual Class Predicted Label Normal Probe Dos U2r R2l % Correct Normal Probe Dos U2r R2l % Correct Table 2: Detected intrusion types in testing dataset For simplified evaluation of our system, besides the classical accuracy measure, I have used two standard metrics of detection rate and false positive rate developed for network intrusions derived in ([4], [26]). Table 3 shows these standard metrics. Actual Class Predicted Label Normal Intrusion Normal TN (32871) FP (27722) Intrusion FN (34809) TP (215627) Table 3: Standard metrics for system evaluation Detection rate for each data type can be seen from figure 3. Copyright to IJIRCCE
10 Figure 3: Detection rate for each class Detection rate (DR) is calculated as the ratio between the number of correctly detected intrusions and the total number of intrusions ([4], [26]) that is: DR=TP/(TP+FN) Using table 3, detection rate, DR = False positive rate (FPR) is calculated as the ratio between the numbers of normal connections that are incorrectly classifies as intrusions and the total number of normal connections ([4], [26]), that is: FPR=FP/(FP+TN) Using table 3, false positive rate, FPR = VII. CONCLUSION AND FUTURE WORK In this paper, a method of applying genetic algorithms with fuzzy logic is presented for network intrusion detection system to efficiently detect various types of network intrusions. To implement and measure the performance of the system I carried out a number of experiments using the standard KDD Cup 99 benchmark dataset and obtained reasonable detection rate. To measure the fitness of a chromosome I used the fuzzy confusion matrix where the fuzzy membership value and fuzzy membership function for the complement of a fuzzy set are two different concepts because the surface value is not always counted from the ground level. The proposed detection system can upload and update new rules to the systems as the new intrusions become known. Therefore, it is cost effective and adaptive. The method suffers from two aspects. Firstly, it generates false alarms which are very serious problem for IDS. Secondly, for high dimensional data, it is hard to generate rules that cover up all the attributes. Copyright to IJIRCCE
11 ACKNOWLEDGEMENT I would like to extend our sincere thanks and gratefulness to H.K. Baruah, Professor, Department of Statistics, Gauhati University, Guwahati, India for his kind help and guidance in preparing this article. REFERENCES [1] J. Gomez and D. Dasgupta, Evolving Fuzzy Classifiers for Intrusion Detection, Proceedings of the IEEE, [2] R. H. Gong, M. Zulkernine, P. Abolmaesumi, A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection, [3] T. Xia, G. Qu, S. Hariri, M. Yousif, An Efficient Network Intrusion Detection Method Based on Information Theory and Genetic Algorithm, Proceedings of the 24th IEEE International Performance Computing and Communications Conference (IPCCC 05), Phoenix, AZ, USA, [4] M. M. M. Hassan, Current Studies on Intrusion Detection System, Genetic Algorithm and Fuzzy Logic, International Journal of Distributed and Parallel Systems, Vol. 4, No. 2, pp , [5] Yao, J. T., S.L. Zhao, and L.V. Saxton, A Study On Fuzzy Intrusion Detection, Proceedings of the Data Mining, Intrusion Detection, Information Assurance, And Data Networks Security, SPIE, Vol. 5812, Orlando, Florida, USA, pp , [6] B. Abdullah, I. Abd-alghafar, Gouda I. Salama, A. Abd-alhafez, Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System, [7] Hemanta K. Baruah, Towards Forming A Field Of Fuzzy Sets, International Journal of Energy, Information and Communications, Vol. 2, Issue 1, pp , [8] Hemanta K. Baruah, The Theory of Fuzzy Sets: Beliefs and Realities, International Journal of Energy, Information and Communications, Vol. 2, Issue 2, pp. 1-22, [9] Tridiv Jyoti Neog, Dushmanta Kumar Sut, Complement of an Extended Fuzzy Set, International Journal of Computer Applications, Vol. 29, No.3, pp , [10] Zadeh L A, Fuzzy Sets, Information and Control, Vol.8, pp , [11] Y.Dhanalakshmi and Dr. I. Ramesh Babu, Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms, International Journal of Computer Science & Network Security (IJCSNS),Vol.8, No.2, pp , [12] W. Lu, I. Traore, Detecting New Forms of Network Intrusion Using Genetic Programming, Computational Intelligence, vol. 20, pp. 3, BlackIll Publishing, Malden, pp , [13] Anup Goyal, Chetan Kumar, GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System, [14] W. Li, A Genetic Algorithm Approach to Network Intrusion Detection, SANS Institute, USA, [15] A. Sung, S. Mukkamala, Identifying important features for intrusion detection using support vector machines and neural networks, in Symposium on Applications and the Internet, pp , [16] J. P. Planquart, Application of Neural Networks to Intrusion Detection, SANS Institute Reading Room. [17] R. G. Bace, Intrusion Detection, Macmillan Technical Publishing, [18] S. Kumar, E. Spafford, A Software architecture to Support Misuse Intrusion Detection, in the 18th National Information Security Conference, pp , [19] K. Ilgun, R. Kemmerer, P. A. Porras, State Transition Analysis: A Rule-Based Intrusion Detection Approach, IEEE Transaction on Software Engineering, pp , [20] S. Kumar, Classification and Detection of Computer Intrusions, Purdue University, [21] V. Bobor, Efficient Intrusion Detection System Architecture Based on Neural Networks and Genetic Algorithms, Department of Computer and Systems Sciences, Stockholm University/Royal Institute of Technology, KTH/DSV, [22] KDD-CUP, Task Description, [23] KDD Cup, Tasks, [24] KDD Cup, Data, [25] H. G. Kayacık, A. N. Zincir-Heywood, M. I. Heywood, Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets, [26] G. Folino, C. Pizzuti, G. Spezzano, GP Ensemble for Distributed Intrusion Detection Systems, ICAPR, pp , BIOGRAPHY MOSTAQUE MD. MORSHEDUR HASSAN was born in Mankachar, Dhuburi (District), Assam, India. He obtained his Master of Computer Application (MCA) degree from Allahabad Agricultural Institute Deemed University, Allahabad. Presently he is working as an Assistant Professor of Computer Science, in the department of Computer Science and Information Technology, Lalit Chandra Bharali College, Maligaon, Guwahati, Assam, India. And he is pursuing Ph.D. in Computer Science under Gauhati University, Guwahati, Assam. His research interests include Network Security, Intrusion Detection and Prevention, Wireless Security, Web Security, and Fuzzy Logic. Copyright to IJIRCCE
CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC
ABSTRACT CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC Mostaque Md. Morshedur Hassan LCB College, Maligaon, Guwahati, Assam, India. [email protected] Nowadays Intrusion
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
Network Based Intrusion Detection System using Genetic Algorithm: A Study
Network Based Intrusion Detection System using Genetic Algorithm: A Study 1 Purushottam Patil, 2 Dr. Yogesh Sharma and 3 Dr. Manali Kshirsagar 1 Research Scholar (Computer Science & Engineering), Faculty
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi School of Computing Queen s University Kingston, Ontario,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Intrusion Detection using Artificial Neural Networks with Best Set of Features
728 The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 Intrusion Detection using Artificial Neural Networks with Best Set of Features Kaliappan Jayakumar 1, Thiagarajan Revathi
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Performance Evaluation of Intrusion Detection Systems using ANN
Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Intrusion Detection Systems using Genetic Algorithms
King Saud University Computer Science Collage CSC590_Selected Topic A Literature Review on Intrusion Detection Systems using Genetic Algorithms Phase # 5 By: Lamees Alhazzaa ID: 426221091 Proposed to:
Applying Genetic Algorithm to Intrusion Detection System
Applying Genetic Algorithm to Intrusion Detection System Vrishali Yewale 1, Vimla Jethani 2, Tushar Ghorpade 3 1 Computer Science Department, Mumbai University, RAIT College of Engineering, Nerul, Navi
An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications
International Journal of Computer Science and Telecommunications [Volume 5, Issue 2, February 2014] 20 An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications
Denial-Of -Service Attack Detection Using KDD
Denial-Of -Service Attack Detection Using KDD Prof. Pankaj Salunkhe 1,Mayur Shishupal 2 1 Head of Department (Electronics & Telecommunication Engineering), YTIET, Bhivpuri [MH], India 2 Pursuing Master
Observation and Findings
Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
USING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
A Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India
Network-Based and Host- Based Intrusion Detection. Harley Kozushko. Graduate Seminar
Network-Based and Host- Based Intrusion Detection Graduate Seminar 1 Goal This presentation is an in-depth overview of intrusion detection. As such, the purpose of the presentation is for reference. 2
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
Hybrid Intrusion Detection System Model using Clustering, Classification and Decision Table
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 4 (Mar. - Apr. 2013), PP 103-107 Hybrid Intrusion Detection System Model using Clustering, Classification
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
Euclidean-based Feature Selection for Network Intrusion Detection
2009 International Conference on Machine Learning and Computing IPCSIT vol3 (2011) (2011) IACSIT Press, Singapore Euclidean-based Feature Selection for Network Intrusion Detection Anirut Suebsing, Nualsawat
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges [email protected] Rayford B. Vaughn [email protected] 23 rd National Information Systems Security Conference
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA Mohamed Faisal Elrawy 1, T. K. Abdelhamid 2 and A. M. Mohamed 3 1 Faculty of engineering, MUST University, 6th Of October, Egypt [email protected] 2,3
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Intrusion Detections Systems
Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Using Genetic Algorithm for Network Intrusion Detection
Using Genetic Algorithm for Network Intrusion Detection Wei Li Department of Computer Science and Engineering Mississippi State University, Mississippi State, MS 39762 Email: [email protected] Abstract
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
Neural networks vs. decision trees for intrusion detection
Neural networks vs. decision trees for intrusion detection Yacine Bouzida Mitsubishi Electric ITE-TCL 1, allée de Beaulieu CS 186 3578, Rennes, France [email protected] Frédéric Cuppens Département
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng
2009 First Asian Conference on Intelligent Information and Database Systems Using Rough Set and Support Vector Machine for Network Intrusion Detection System Rung-Ching Chen and Kai-Fan Cheng Ying-Hao
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
Design and Develop an Intrusion Detection System Using Component Based Software Design
Design and Develop an Intrusion Detection System Using Component Based Software Design Er. Mohit Angurala, Er. Malti Rani 1,2 (Computer Science Deptt, Punjab Institute of Technology (PTU Main Campus Kapurthala/
System for Denial-of-Service Attack Detection Based On Triangle Area Generation
System for Denial-of-Service Attack Detection Based On Triangle Area Generation 1, Heena Salim Shaikh, 2 N Pratik Pramod Shinde, 3 Prathamesh Ravindra Patil, 4 Parag Ramesh Kadam 1, 2, 3, 4 Student 1,
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL Prof. Santosh T. Waghmode 1, Prof. Vinod S. Wadne 2 Department of Computer Engineering, 1, 2 JSPM s Imperial College of Engineering
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
Data Mining for Network Intrusion Detection
Data Mining for Network Intrusion Detection S Terry Brugger UC Davis Department of Computer Science Data Mining for Network Intrusion Detection p.1/55 Overview This is important for defense in depth Much
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
A Comparison of Four Intrusion Detection Systems for Secure E-Business
A Comparison of Four Intrusion Detection Systems for Secure E-Business C. A. P. Boyce, A. N. Zincir-Heywood Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada {boyce, zincir} @ cs.dal.ca
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Double guard: Detecting Interruptions in N- Tier Web Applications
Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar
A Neuro Fuzzy Based Intrusion Detection System for a Cloud Data Center Using Adaptive Learning
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 3 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0043 A Neuro Fuzzy Based Intrusion
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach Tanusree Chatterjee Department of Computer Science Regent Education and Research Foundation Abstract- The rapid
On A Network Forensics Model For Information Security
On A Network Forensics Model For Information Security Ren Wei School of Information, Zhongnan University of Economics and Law, Wuhan, 430064 [email protected] Abstract: The employment of a patchwork
Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science
A Seminar report On Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org
Intrusion Detection Systems
Intrusion Detection Systems Sokratis K. Katsikas Dept. of Digital Systems University of Piraeus [email protected] Agenda Overview of IDS Intrusion prevention using game theory Reducing false positives Clustering
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION
ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION Like Zhang, Gregory B. White Department of Computer Science, University of Texas at San Antonio [email protected], [email protected]
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
