FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION
|
|
|
- Marilynn Armstrong
- 10 years ago
- Views:
Transcription
1 FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges Rayford B. Vaughn 23 rd National Information Systems Security Conference October 16-19, 2000
2 OUTLINE AI and Intrusion Detection Intrusion Detection System Design Fuzzy Logic and Data Mining Fuzzy Association Rules Fuzzy Frequency Episodes Intrusion Detection via Fuzzy Data Mining GA s for System Optimization Summary and Future Work
3 AI TECHNIQUES AND INTRUSION DETECTION Long history of AI techniques applied to intrusion detection. For example: Rule-Based Expert Systems( Lunt and Jagannathan 1988) State Transition Analysis (Ilgun and Kemmerer 1995) Genetic Algorithms (Me 1998) Inductive Sequential Patterns (Teng, Chen and Lu 1990) Artificial Neural Networks (Debar, Becker, and Siboni 1992) Data mining applied to intrusion detection is an active area of research. Examples include: Lee, Stolfo, and Mok (1998) Barbara, Jajodia, Wu, and Speegle (2000)
4 UNIQUE FEATURES OF OUR WORK Combines fuzzy logic with data mining Overcomes sharp boundary problems of many systems Reduces false positive errors Can be used for both anomaly detection and misuse detection Includes real-time components Uses genetic algorithms for system optimization
5 FUZZY LOGIC AND SECURITY Many security-related features are quantitative e.g., temporal statistical measurements (Porras and Valdes 1998; Lee and Stolfo 1998)» SN: number of SYN flags in TCP header during last 2s» FN: number of FIN flags in TCP header during last 2s» RN: number of RST flags in TCP header during last 2s» PN: number of distinct destination ports during last 2s Timestamp first 2 seconds second 2 seconds third 2 seconds...
6 FUZZY LOGIC ALLOWS OVERLAPPING CATEGORIES Low Medium High Low Medium High Destination Ports a. Non-fuzzy sets Destination Ports b. Fuzzy sets
7 FUZZY LOGIC OVERCOMES SHARP BOUNDARY PROBLEMS Medium A B 0 x1 x2 x3 x4... A B LOW MEDIUM HIGH 0 x1 x2 x3 x4... If Medium is the normal pattern, then without fuzzy sets, A & B are both outside of the normal pattern. Fuzzy logic allows degrees of normality.
8 INTELLIGENT INTRUSION DETECTION MODEL Integration of fuzzy logic with data mining Fuzzy association rules Fuzzy frequency episodes Preliminary architecture Includes both misuse detection and anamoly detection Integrates machine-level and network-level information Optimization using genetic algorithms
9 Network Traffic or Audit Data (1) Network Traffic or Audit Data (2)... Network Traffic or Audit Data (m) Background Unit Machine Learning Component ( by mining fuzzy association rules and fuzzy frequency episodes ) Core Component Intrusion Detection Module 1 Intrusion Detection Module n+1... Intrusion Detection Module n Experts... Anomaly Detection Intrusion Detection Module n Decision-Making Module Administrator Misuse Detection Server Communication Module Clients Intrusion Detection Sentry 1 Host or Network Device Intrusion Detection Sentry 2 Host or Network Device... Intrusion Detection Sentry s Host or Network Device
10 MINING FUZZY ASSOCIATION RULES Association rules represent commonly found patterns in data. Association Rule Format: R1: X Y, c, s X and Y are disjoint sets of items s (support) tells how often X and Y co-occur in the data c (confidence) tells how often Y is associated with X. Our system is unique: X and Y are fuzzy variables that take fuzzy sets as values
11 FUZZY ASSOCIATION RULES Sample Fuzzy Association Rule: { SN=LOW, FN=LOW } { RN=LOW }, c = 0.924, s = 0.49 Interpretation: SN, FN, and RN are fuzzy variables. The pattern { SN=LOW, FN=LOW, RN=LOW } has occurred in 49% of the training cases; When the pattern { SN=LOW, FN=LOW } occurs, there will be 92.4% probability that { RN=LOW } will occur at the same time.
12 SAMPLE FUZZY FREQUENCY EPISODE RULES { E1: PN=LOW, E2: PN=MEDIUM } { E3:PN=MEDIUM } c = 0.854, s = 0.108, w = 10 seconds E1, E2 and E3 are events occurring within the time window 10 seconds. PN is a fuzzy variable The events occur in the order E1, E2, E3, but there may also be intervening events { PN=LOW, PN=MEDIUM, PN=MEDIUM } has occurred 10.8% in all training cases; When { PN=LOW, PN=MEDIUM } occurs, { PN=MEDIUM } will follow with 85.4% probability.
13 FUZZY DATA MINING FOR INTRUSION DETECTION Modification of non-fuzzy methods developed by Lee, Stolfo, and Mok (1998) Anomaly Detection Approach Mine a set of fuzzy association rules from data with no anomalies. When given new data, mine fuzzy association rules from this data. Compare the similarity of the sets of rules mined from new data and normal data.
14 1 0.8 Similarity T1 T2 T3 T4 T5 T6 T7 T8 T9 Similarity Test Data Sets Similarities between Training Data Set and Different Test Data Sets by Mining Fuzzy Association Rules on SN, FN, and RN. Training data collected in the afternoon. T1-T3 afternoon T4-T6 evening T7-T9 late night Data source: MSU CS network
15 1 0.8 Similarity T1 T2 T3 T4 T5 T6 T7 T8 T9 Similarity E E E-05 Test Data Sets Similarities between Training Data Set and Different Test Data Sets by Mining Fuzzy Frequency Episodes on PN. Training data collected in the afternoon. T1-T3 afternoon T4-T6 evening T7-T9 late night Data source: MSU CS network
16 Similarity Baseline Network1 Network3 Similarity Test Data Sets Similarities between Training Data Set and Different Test Data Sets by Mining Fuzzy Association Rules on SN, FN, and RN Similarity Baseline Network1 Network3 Similarities between Training Data Set and Different Test Data Sets by Mining Fuzzy Frequency Episodes on PN Similarity Testing Data Sets Training data: no intrusions Test data: baseline (no intrusions) network1 (includes simulated IP Spoofing intrusions) network3 (includes simulated port scanning intrusions)
17 REAL-TIME INTRUSION DETECTION Given a fuzzy episode rule R: { e1,, ek-1 } { ek }, c, s, w, if {e1,, ek-1} has occurred in the current event sequence, then { ek } can be predicted to occur next with confidence of c. If the next event does not match any prediction from the rule set, it will be alarmed as an anomaly. Define anomaly percentage = number of anomalies / number of events
18 Anomaly Percentage (%) 40% 30% 20% 10% 0% T1' T2' T3' T4' T5' T6' Anomaly Percentage 8.99% 9.55% 7.30% 25.60% 33.71% 32.39% Test Data Sets Anomaly Percentages of Different Test Data Sets in Real-time Intrusion Detection by Mining Fuzzy Frequency Episodes on PN Training Data: No intrusions Test Data: T1 -T3 no intrusions T4 -T6 simulated mscan Experiments and Results
19 FUZZY VS. NON-FUZZY Comparing the false positive error rates of fuzzy episode rules with non-fuzzy versions for real-time intrusion detection 20% False Positive Error Rate (%) 15% 10% 5% 0% T1' T2' T3' T4' T5' T6' Fuzzy 8.99% 9.55% 7.30% 4.44% 6.67% 8.89% Non-Fuzzy 17.98% 12.92% 15.25% 11.11% 17.78% 11.11% Test Data Sets
20 USING GENETIC ALGORITHMS FOR OPTIMIZATION Problem with NIDS System uses a fixed set of features for all kinds of situations Fuzzy membership functions must be predefined. Hypothesis Different features may be useful for different classes of intrusion attacks and for different situations. The performance of the system can be improved by using a GA to evolve an optimal set of features and fuzzy membership functions.
21 GENETIC ALGORITHMS Optimization goals APPROACH Maximize the similarity of rules mined from normal data with baseline rule set Minimize the similarity of rules mined from abnormal data with baseline rule set Parameters to change Features available from audit data Fuzzy membership function parameters
22 0a' d c' a c b Z S PI X Y + = = = ),, ( ),, ( ),, ( ') ',, ( 1 ') ',, ( ),, ( 2 2 d b b Z b d b S b d PI c a S c a Z a c c a c a a c S µ µ µ µ µ µ µ µ µ a 2 c a a + <µ c c a < + µ 2 c<µ µ µ < < b b FUZZY SETS ARE DEFINED BY PARAMETERIZED MEMBERSHIP FUNCTIONS
23 EXAMPLE RUN Membership functions before and after the GA optimization FN Original Membership Functions FN Learned Membership Functions 1 1 Membership Membership low medium high Number Number low medium high
24 OPTIMIZATION RESULTS Similarity to Normal baseline network1 network3 pre-selected feature and fuzzy membership functions optimized features and fuzzy membership functions baseline (no intrusions) network1 (includes simulated IP Spoofing intrusions) network3 (includes simulated port scanning intrusions)
25 FEATURES SELECTED FOR IP SPOOFING AND PORT SCANNING ATTACKS IP Spoofing Port Scanning Feature Selected Luo s Features Source IP, FIN, Data Size, Port number Source IP, Destination IP, Source Port, and Data size. SYN, FIN, RN SYN, FIN, RN
26 CONCLUSIONS Developed an architecture for integrating machine learning methods with other intrusion detection methods. Extended data mining techniques by integrating fuzzy logic Demonstrated that these methods are superior to their non-fuzzy counterparts. Developed a method for real-time intrusion detection using fuzzy frequency episodes. Used GA s to improve the performance of the system by selecting best set of features and by tuning the fuzzy membership function parameters
27 Current and Future Work Further work with fuzzy frequency episodes and real-time intrusion detection Using fuzzy logic for data fusion by the decision module Generating misuse modules from association rules Using incremental data mining to deal with drift in normality Investigating intrusion detection in high speed clusters of workstations
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION. Abstract
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges, Associate Professor Rayford B. Vaughn, Associate Professor Department of Computer Science Mississippi State University
Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No., February 8 7 Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms Y.Dhanalakshmi and Dr.I. Ramesh
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Slow Port Scanning Detection
Slow Port Scanning Detection Mehiar Dabbagh 1, Ali J. Ghandour 1, Kassem Fawaz 1, Wassim El Hajj 2, Hazem Hajj 1 1 Department of Electrical and Computer Engineering 2 Department of Computer Science American
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Calculation Algorithm for Network Flow Parameters Entropy in Anomaly Detection
Calculation Algorithm for Network Flow Parameters Entropy in Anomaly Detection Theory, practice, applications Oleg Gudkov, BMSTU IT Security for the Next Generation International Round, Delft University
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
On A Network Forensics Model For Information Security
On A Network Forensics Model For Information Security Ren Wei School of Information, Zhongnan University of Economics and Law, Wuhan, 430064 [email protected] Abstract: The employment of a patchwork
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Network Intrusion Detection Systems. Beyond packet filtering
Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA
SERIES IN ELECTRICAL AND COMPUTER ENGINEERING Intrusion Detection A Machine Learning Approach Zhenwei Yu University of Illinois, Chicago, USA Jeffrey J.P. Tsai Asia University, University of Illinois,
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
USING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
Using Genetic Algorithm for Network Intrusion Detection
Using Genetic Algorithm for Network Intrusion Detection Wei Li Department of Computer Science and Engineering Mississippi State University, Mississippi State, MS 39762 Email: [email protected] Abstract
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Artificial Neural Networks for Misuse Detection
Artificial Neural Networks for Misuse Detection James Cannady School of Computer and Information Sciences Nova Southeastern University Fort Lauderdale, FL 33314 [email protected] Abstract Misuse detection
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues
CS 155 May 20, 2004 Firewalls Basic Firewall Concept Separate local area net from internet Firewall John Mitchell Credit: some text, illustrations from Simon Cooper Router All packets between LAN and internet
Intrusion Detection Systems with Correlation Capabilities
Intrusion Detection Systems with Correlation Capabilities Daniel Johansson [email protected] Pär Andersson [email protected] Abstract Alert correlation in network intrusion detection systems
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Detecting Novel Network Intrusions Using Bayes Estimators
Detecting Novel Network Intrusions Using Bayes Estimators Daniel Barbará, Ningning Wu, and Sushil Jajodia 1 Introduction From the first appearance of network attacks, the internet worm, to the most recent
CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC
ABSTRACT CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC Mostaque Md. Morshedur Hassan LCB College, Maligaon, Guwahati, Assam, India. [email protected] Nowadays Intrusion
Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko
Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems Christopher Roblee Vincent Berk George Cybenko These slides are based on the paper Implementing Large-Scale Autonomic Server
A Novel Solution on Alert Conflict Resolution Model in Network Management
A Novel Solution on Alert Conflict Resolution Model in Network Management Yi-Tung F. Chan University of Wales United Kingdom [email protected] Ramaswamy D.Thiyagu University of East London United
Intrusion Detection System for Cloud Network Using FC-ANN Algorithm
Intrusion Detection System for Cloud Network Using FC-ANN Algorithm Swati Ramteke 1, Rajesh Dongare 2, Komal Ramteke 3 Student, Department of Information Technology, VIIT, Pune, India 1 Student, Department
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Neural Networks for Intrusion Detection and Its Applications
, July 3-5, 2013, London, U.K. Neural Networks for Intrusion Detection and Its Applications E.Kesavulu Reddy, Member IAENG Abstract: With rapid expansion of computer networks during the past decade, security
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Intrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Network Security Management
Network Security Management TWNIC 2003 Objective Have an overview concept on network security management. Learn how to use NIDS and firewall technologies to secure our networks. 1 Outline Network Security
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications
International Journal of Computer Science and Telecommunications [Volume 5, Issue 2, February 2014] 20 An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
A Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
A Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
Computational intelligence in intrusion detection systems
Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick Chang @ TEIL Reference The use of computational intelligence in intrusion detection systems : A review
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Data Mining Approach in Security Information and Event Management
Data Mining Approach in Security Information and Event Management Anita Rajendra Zope, Amarsinh Vidhate, and Naresh Harale Abstract This paper gives an overview of data mining field & security information
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic Mostaque Md. Morshedur Hassan Assistant Professor, Department of Computer Science and IT, Lalit Chandra Bharali College, Guwahati,
Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding
Firewalls slide 1 configuring a sophisticated GNU/Linux firewall involves understanding iptables iptables is a package which interfaces to the Linux kernel and configures various rules for allowing packets
On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks
CIBSI 2013 Panama City, Panama, October 30 th, 2013 On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks Paulo Simões, Tiago Cruz, Jorge Gomes, Edmundo Monteiro [email protected]
CS155 - Firewalls. Simon Cooper <[email protected]> CS155 Firewalls 22 May 2003
CS155 - Firewalls Simon Cooper CS155 Firewalls 22 May 2003 1 Why Firewalls? Need for the exchange of information; education, business, recreation, social and political Need to do something
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Usage of Netflow in Security and Monitoring of Computer Networks
Usage of Netflow in Security and Monitoring of Computer Networks Shivam Choudhary MIT Manipal ABSTRACT Management of a network is a challenging task without accurate traffic statistics. Through this paper
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
