Research on Network Security Situation Awareness Technology based on AIS SunJun Liu 1 1 Department of Computer Science
|
|
|
- Susanna Morrison
- 10 years ago
- Views:
Transcription
1 International Journal of Knowledge and Language Processing AKLP International c2011 ISSN Volume 2, Number 2, April 2011 pp Research on Network Security Situation Awareness Technology based on AIS SunJun Liu 1 1 Department of Computer Science ChengDu University of information Technology Chengdu, , China [email protected] Le Yu 2 2 Military Representative office of PLA in No.3531 plant Box.No.4, P.O.Box.301 Guiyang, Guizhou, , China [email protected] Jin Yang 3 3 Department of Computer Science LeShan Normal Univ., LeShan, China [email protected] Received March 2011; revised April 2011 ABSTRACT. With the applying of artificial immune technology in the field of network security situation awareness, this article puts forward a new immune network security situation awareness model to enable self-learning and self-adapting of network system, and increase its immunity and viability. When network is under attack, it can find out the current network security situation and future trend in an all-around way, provide grounds for reasonable and accurate response to guarantee the usability of system. Keywords: network security situation, intrusion detection, artificial immunity, network security 1. Introduction. Along with the popularization of network, the threat it faces is growing bigger, for example, computer virus, Trojan horse program and DOS/DDOS attack are increasingly rampant. So as to guarantee the smooth running of network, presently adopted traditional technology of intrusion detection, firewall and virus detection are all in passive defense way and in independent working status, therefore, they don t have cognition on the network resource they are protecting for. And this cognition disjunction increases the time needed for operator to make a decision for alarm raised, and therefore, misses the optimal timing of handling. This article applied artificial immunological technique in the field of network security 23
2 situation awareness, designed and established an immune network security situation awareness system. It is aimed to carry out real-time monitor on network security situation, realize real-time and quantitative awareness of network security situation before malicious network behavior becomes out of control, and help make timely and effective network security strategy adjustment for better general security safeguard of system. 2. Brief Research Status on current network security situation awareness technique. Because network security situation technology is a newly emerging one, domestic and overseas research on this field is still at starting stage, and related research results are less common. Some research is based on information warfare ground situation awareness and some other emphasizes on improvement on traditional intrusion detection model. From the view of information warfare, main situation awareness model frame now popular in foreign countries currently is one using data fusion technology and data mining to extract security situation put forward by Edward Waltz [1]. The JDL(Joint Director of Laboratories)[2]model brought forth by US Defense Department makes association analysis and data combination of received data from sensors and information source to obtain overall evaluation of warfare ground and threat degree. And from the view of network security, there is mainly network security situation awareness frame based on intrusion detection fusion brought forth by Tim Bass[3]. Jason Shifflet[4] made analysis and comparison on corresponding concepts of network security awareness, and put forth technology free structure based on modularization. 3. System principles of the detection model based on immune multi-agent. Apart from inheriting the original characteristics of Agent, immune agent also has the characters of evolution, diversity, tolerance and detection [4,5] properties etc. Evolution: Following the evolution law, IA activates antibodies, which can effectively recognize antigens, into higher form, while eliminates the inefficient one. In this way, the self-learning ability of detection is realized. Diversity: The matching of antibodies and antigens adopts fuzzy matching, with just the need to meet the preset value. The incomplete matching, which realizes the diversity of recognition, enables immune antibodies to recognize various kinds of antigens and in this way, it can produce antibodies covering the whole form space in theory. Tolerability: Immune tolerability refers to the non-response status of immune cells towards the peculiarities revealed by certain kinds of antigens [7]. The tolerability of IA is of great significance in the maintaining and balancing of the model. Detection property: The immune system transmits the produced immune cells within each organ in vivo to increase immunologic competence. Network security model based on this mechanism is of great detection ability. Combined with multi-agent and AIS technology, the detection model constitutes a multi-direction and multi-level intelligent network security model, with its mapping relationship with BIS model as shown in Table 1, and its system structure diagram as shown in Figure 1. 24
3 TABLE 1. The Relationship between the BIS and the NIDIMA Biological immune system Network intrusion detection system Organism Network Organ Network segment Cell Host computer Vaccine distribution The transmission of intrusion information Antigen The binary character string feature-extracted from IP packets B Cell,Antibody Antibodies represented in binary character string Cell clone Duplication of antibody The model adopts large-scale and distributed system structure, and a series of network situation awareness agents and a network security situation evaluation agent is deployed in target network s and its host computer firstly. Security situation evaluation agent gathers information about the security situation of subordinate subnets and host computers from each security situation awareness agent to evaluate about the whole integrated risks to the whole network, and the information includes the type, quantity, strength and harmfulness of the attacks. security situation agent security situation agent security situation evaluation center security situation agent security situation agent security situation agent FIGURE 1. Architecture of NIDIMA The network security situation awareness agent shown in Figure 1 is itself a sub-network 25
4 removing detected non-self bodies security situation awareness system, defined by recursion, and it mainly monitors on the sub-network security situation within its control, and specifically speaking, real-time monitor on the type, strength and harmfulness of attacks suffered by sub-network. Because there might as well be subnets under subnets, sub-network security situation awareness agents may be composed of sub-network security situation awareness agents at lower level. Eventually, security situation awareness agents, that monitor the specific host computer, are made up of intrusion detection and security situation evaluation of the host computer. In this architecture, IA distributed at host computer node starts to recognize the intruded events at first, and in case unknown attacks are discovered through learning and memory, information will then be sent to corresponding SMC, while vaccines that has identified new attacks will be distributed to each node within the same network segment to improve the intrusion defense capability of each node. SMC makes analysis on the intrusion information sent by each IA in the network segment and SMC of suffered network segment will send vaccines to other non-intruded network segments for early warnings for the realization of whole detection System mechanism of the network intrusion model based on immune multi-agent. In Figure 2, the logical structure of IA is shown, which includes self-antigens, immature immune antibodies, mature immune antibodies and memory immune antibodies etc. The working procedures involve two interplaying and concurrent circulations, which are the circulation of immune antibodies detection of external antigens and the circulation of immune antibodies evolution. IP packet antigen Non-self antigens detected by memory cells memory cell Matching with self Non-self antigens detected by memory cells Activate Non-self antigens detected by mature cells mature cell Mature cells are not activated in it life cycles death Alive antigens detected by mature cells bone marrow model Self tolerance immature cell Successful tolerance Failure tolerance FIGURE 2. Architecture of Immune Agent 26
5 3.2. The definition of immune elements. Definition 1: Antigens are binary character strings in the length of l that are feature-extracted from network IP data packets. Let U={0, 1}l (l>0),antigen assembly Ag U, it mainly includes IP address, port and protocol type etc. Ag { a, b a D b Ψ a l a APCs( b)} (1) Definition 2: The antigen assembly Ag is classified into two substes of self-assembly Self (normal network behavior) and non-self assembly Nonself (abnormal network behavior): Self NonSelf = Ag, Self Nonself = Antibodies and antigens have binary character strings of the same features and length, the definition of antibody assembly B U: (2) B { Ab Ab s, age, count, ag } Antibody Ab is a quadruple, among which s means binary string in the length of l, age is the age of antibody, count is the quantity of antigens matched with antibodies, ag is the antigens that are detected by the antibodies. Antibodies are classified into three categories: mature antibodies, memory antibodies and immature antibodies. Mature antibodies, tolerable to self-bodies, refer to the antibodies that are not activated by antigens, mature antibodies assembly TAb U; Memory antibodies evolve from mature antibodies that are not activated, memory antibodies assembly MAb U; Immature antibodies are antibodies that have not undergone self-tolerance, immature antibodies assembly IAb D. Definition 3: Affinity serves as the main evidence to judge the matching state between antibodiesand antigens, and the calculation formula is as formula (3), equaling to 1 means matching, or else non-matching. In the formula, x Ag,y B,xi,yi are the i-th characters of x,y respectively, l is the length of character string, is the threshold value of affinity matching. 1, ( fh_dis( x,y) / l) l 2 fmatch( x, y) fh _ dis( x, y) ( xi yi ) (3) 0, otherwise i The changing process of immature antibodies. Let I be the number of immature antibodies included in IAb at certain time, the dynamic changing formula of immature antibodies assembly is: Imature Idead I( t t) I( t) Inew t ( t t) (4) mature The formula (4) indicates that the changing process of IAb assembly is divided into 2, that is, inflow and outflow. Inflow is the process of newly produced immature antibodies joining in IAb assembly: I = Inew t,inew means the production rate of immature antibodies per unit of time. Outflow is the process of removing immature antibodies from IAb assembly, and there are two directions of outflow: the quantity of immature antibodies decreased out of successful tolerance and evolution into mature antibodies is presented by I mature t mature tolerance failure. I dead, and dead t dead presents the quantity of immature antibodies decreased out of 27
6 In order to avoid matching between antibodies and self-bodies, newly produced immature antibodies can only match with antigens after passing self-tolerance. The tolerance process is shown as in formula(5), and 1 means passing self-tolerance, 0 means failure of self-tolerance, x IAb. f tolerate 0 ( x) 1 y Self f otherwise match ( x, y) The changing process of mature antibodies. Let T represent the number of mature antibodies included in TAb at certain time, and the dynamic changing formula of mature antibodies assembly is: Imature Idead I( t t) I( t) Inew t ( t t) (6) mature The formula (6) indicates that the changing of TAb assembly is divided into two processes: inflow and outflow. The inflow is the process of antibodies joining the TAb, and there are two ways: The number increased out of immature antibodies successful tolerance and evolution is represented by T tolerate T t ; clone t tolerate clone dead means the number increase out of clonal selection of memory antibodies. Outflow is the process of removing mature antibodies, it also has two directions: the number of memory antibodies that have been evolved from activation is presented as Tactive t active T, while dead t represents the number dead that die from failed activation. The mature antibodies assembly Tactive that have been activated and evolved into memory antibodies is shown in formula (8), and the mature antibodies assembly Tdead that have failed in activation is shown in formula(9), among which is activation threshold, and is the life cycle of mature antibodies. T : { x x T x. count x. age } (7) T active dead Ab : { x x T x. count x. age } Ab 3.5. The changing process of memory antibodies.let M as the memory antibodies quantity contained in MAb at certain time, and the dynamic changing formula of memory antibodies assembly is: M active Mbacterin M ( t t) M ( t) t t (9) active bacterin Because memory antibodies have infinite life cycle, the change of Mb assembly only has the process of inflow, without the outflow process of dead memory cells. The inflow of memory antibodies is conversed by activated mature antibodies active, M active Tactive t t. active active 3.6. Immune surveillance. During the detection process of IA on network behaviors, it (5) (8) 28
7 mainly adopts mature cells and memory cells to detect antigens, and it is capable to detect non-self antigens efficiently and rapidly, what follow are the detailed steps: (1). Antigen presentation: The feature information of IP packet is extracted from actual network data flow to constitute a binary string in the length of l, which is then put in the antigen assembly Ag as antigen regularly. (2). Using memory antibodies MAb to detect antigens: Non-self bodies that match with memory antibodies are removed, and memory antibodies that have detected self bodies in are also removed. (3). Using mature antibodies TAb to detect antigens: The non-self antibodies that match with TAb are removed, and the TAb that has detected enough antigens in the life cycle is then activated and evolved into memory antibodies MAb; The MAb that has not been activated or detected self elements in life cycle will die. (4). Self body assembly upgrade: After detection, the left antigens will join in self body assembly, maintain dynamic self body upgrading, undergo self tolerance with immature antibodies and maintain dynamic evolution of antibodies. 4. Immune network security situation awareness technology. Biological Immune System (BIS) is a complicated system with the ability of self-adapting,self-learning, self-organizing, parallel processing and distributed coordinating, and it also has the basic function to distinguish self and non-self and clean non-self. The problems in the field of computer security and Artificial Immune Systems have the astonishing similarity of keeping the system stable in a continuous changing environment. Artificial Immune System[5-7] can use biological immune theoretic for references to search and design relevant models and algorithms to solve the various problems occurred in the field of computer security. Technology for Network Security Situational Awareness, which is a positive defense technology, has become the orientation of research in the field of network security. Based on the analysis of the papers from domestic and foreign on technologies for network security situational awareness, this paper designs and builds a network security situational awareness system based on the profound research of BIS. The system uses network intrusion detection, which based on the theory of biological immunity as the base of situational awareness, to detect known and unknown intrusions with the help of biological technology such as self/non-self discrimination, self-tolerance, self-learning, evolution mechanism, immunological surveillance, etc. According to correspondence relations of density change of antibody in the artificial immune systems and pathogen invasion intensity, a novel network risk evaluation model is also established. Based on the current real-time network risk evaluation, the thesis also makes risk evaluation on short- term, medium-term long-term network in different span. In the tendency prediction for network security, this paper uses Grey Markov Model to make quantitative prediction on short- term, medium-term long-term risk in different span. These methods make overall and quantitative identification about network security, and it is also helpful to resemble network security tragedy effectively, therefore, protect network infrastructure greatly. 29
8 The self-adaptability, distributed character and quantization of antibody concentration that biological immune system bears are just the effective method to solve the technological problems of network security situation awareness, thus this article applies the characteristics of biological immune mechanism in the field of network security situation awareness research, and establishes immune network security situation awareness system to make real-time and quantitative analysis on network security condition and its changing trend. Executive Strategy High Response strategy Network situation forecast Situation forecast Level of Network security situation Awareness Association analysis Network risk quantitative evaluation Detector classification based on relation by blood Situation evaluation Low Network security situation elements extraction Intrusion system based on artificial immunity Situation awareness FIGURE 3. System structure of network security situation awareness Network security situation is a macro reaction to the running status of network information system, is a process of mining, understanding and forecasting situation elements which reflect network security condition, thus the network security situation awareness system based on artificial immunity raised here is divided into three levels in system structure, namely network security situation awareness, situation evaluation and situation forecast in succession, as shown in figure 3. Here comes next is a detailed introduction on system structure of network security situation awareness system Situation awareness. Situation awareness is the foundation of network security situation awareness, which filters simplifies and combines the corresponding states and properties of various factors which bear influence on network security situation, and get situation factors which reflect system security state to make preparation for situation 30
9 evaluation. But due to lack of self-adaptability and self-learning, traditional intrusion detection system cannot recognize unknown attack or virus varieties, thus it is hard for it to provide overall and effective situation information to network administrator. However, intrusion detection technique based on artificial immunity has solved this problem, and figure 2 illustrates the working process of intrusion detection model based on immunity. The working process of this model is composed of two parts, one is recognizing intrusion process by immune detector, which are in simple line; the other is the evolving process of immune detector, in hair strip, the two processes are mutually affected and in process simultaneously. During the evolving process of immune detector, it is divided into immature detector, mature detector and memory detector according to the self evolvement of detector, among which newly generated immature detector evolves to mature detector after self-tolerance, and mature detector is activated and evolves to memory detector if it matches non-body antigens to a certain amount in its lifecycle, or else it shall die of aging. And memory detector has infinite lifecycle. IP Packets Antigen Presentation Nonself Ag Mature detectors set T b Belong to Self Ag Activation detect Memory detectors set M b Too old Match Self Dynamic tolerance Self set Immature detectors set I b Nonself Ag Match Self Dead Match Self FIGURE 4. Working process of intrusion detection model based on immunity During the course of detector s recognizing of antigens, IP data packet transmitting in network forms antigen assembly after being presented by antigen. Antigen assembly is detected firstly by memory detector, then mature detector and at last antigens left which have passed the detection are added into auto-assembly for tolerance training with immature detector Situation evaluation. Situation evaluation is the core of situation awareness, and is a dynamic understanding process of current security situation. Situation evaluation makes association analysis of security events among factor information and concludes on risk level according to the degree of threat in order to reflect the security situation of the whole network. Based on the corresponding relationship of the change of antibody concentration of 31
10 human immune system and pathogen s intrusion rate, it is put forth that network risk evaluation model based on immunity can realize real-time and quantitative evaluation of network security situation. This method can make network risk evaluation in dynamic way, realize overall evaluation of the attacks in each level of host computer, sub-network and whole network, get current system risk and reflect the security situation of present network timely and accurately. In figure 5, distributed structure of network security risk evaluation model is given. In this structure, massive LCRS distributed in network makes local security risk evaluation and at the same time, sends information such as antibody concentration and types etc to SREC for fusion, furthermore, it calculates out the whole risk of whole network as well as categorized risk of each kind of attack and makes real-time and quantitative description of network security situation. FIGURE 5. Network security risk evaluation model structure based on immunity. On the foundation of AIS based network risk evaluation, it could make evaluation towards short-term, medium-term, long-term network in different span, then make analysis on the results, discuss the randomness of risk changes in real-term and short-term, as well as the periodicity in mid-term and long-term network risk changes. The model takes an overall overview on risk change tendency on every hierarchy of network from different viewpoints, therefore, it is likely to build a safeguard system Situation forecast. Situation forecast is the highest level of situation awareness, it is based on historical and present network security situation information and makes quantitative prediction of the network security situation some period in the future so that decision-maker can have more complete network security situation and provides accurate grounds for reasonable response strategy to restrain network attack. As to the fuzziness, randomness and uncertainty of future security situation change, it is put forth that gray theory can be adopted for establishing network security situation forecast model. Meanwhile, considering that network security situation awareness system is non-linear and the data is of high random fluctuation, Markov s state transition matrix [10] is adopted to modify gray model s forecast results and make up for the limitation of gray forecast model. Therefore, gray theory and Markov theory are combined to bring the 32
11 advantages of both to full play and overcome the defects of both, thus Gray Markov forecast model came into being. During the forecast process, the classical GM (1, 1) model of gray theory is adopted to make prediction of network security situation data and find out its changing trend, and then Markov theory is used to make modifications on model error to improve the forecast accuracy of network security situation changing trend. 5. Brief Summary. With the applying of artificial immune technology in the field of network security situation awareness, this article puts forward a network security situation awareness model based on immunity, and it is divided into three levels in brief: security situation awareness, security situation evaluation and security situation forecast, among which security situation awareness is the basis of the whole system, it extracts situation elements and makes preparation for situation evaluation; Situation evaluation is the core of situation awareness as well as a dynamic reasoning and understanding process of current security situation; Situation forecast makes prediction of future network security trend based on historical and present network security situation information. When network information system is under attack, network security situation awareness model based on immunity has all-around and whole knowledge of current network security situation and its future trend and can provide grounds for reasonable and accurate response to guarantee the availability of system. It can change current passive defense situation using traditional network security approaches such as firewall, leaks scan techniques, ids and so on, and is helpful to establish new generation proactive defense theories and realization techniques. Meanwhile, the work is not only theoretic values to design network security awareness system in any complex network circumstances, but also very significant to protect network infrastructure for our country. Acknowledgment. This work is supported by the National Natural Science Foundation of China under Grant (No ). REFERENCES [1] Endsley M.R,, Design and evaluation for situation awareness nehancement, Proc. 7th IFAC/IFIP/IFORS/IEA symposium on Analysis, Design and Evaluation of Man-Machine System, Kyoto,1998, pp [2] Bass T. Intrusion Detection Systems and Multisensor Data Fusion:Creation Cyberspace Situation Awareness, Communications of the ACM, 2000, vol (43), April,pp [3] Steinburg A.N,Bowman C.L, White F.E, Revision to the JDL Data Fusion Model, Joint NA TO/IRIS Conference, Quebec, Octorber [4] Shifflet J, A Technique Independent Fusion Model For Network Intrusion Detection, Proc of the Midstates Conference on Undergranduate Research in Computer Science and Mathematics,2005,vol(3), pp [5] Jerne.N, K. Towards, a Network Theory of the Immune System. Annnual Immunology, 1974, 33
12 125: [6] Forrest S, Self-Nonself Discrimination in a Computer. Proc of IEEE Symposium on Research in Security and Privac. Oakland: IEEE Press, [7] Perelson A, Weisbuch G.Immunology for physicists. Review of Modern Physics, 1997, 69(4):
A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM
A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM Walid Mohamed Alsharafi and Mohd Nizam Omar Inter Networks Research Laboratory, School of Computing, College
Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2
3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model
Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *
Send Orders for Reprints to [email protected] 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Computational intelligence in intrusion detection systems
Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick Chang @ TEIL Reference The use of computational intelligence in intrusion detection systems : A review
Cloud Security - Characteristics, Advantages and Disadvantages
The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,
HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
The Multi-Agents Immune System for Network Intrusions Detection (MAISID)
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
A Novel Solution on Alert Conflict Resolution Model in Network Management
A Novel Solution on Alert Conflict Resolution Model in Network Management Yi-Tung F. Chan University of Wales United Kingdom [email protected] Ramaswamy D.Thiyagu University of East London United
The Body s Defenses CHAPTER 24
CHAPTER 24 The Body s Defenses PowerPoint Lectures for Essential Biology, Third Edition Neil Campbell, Jane Reece, and Eric Simon Essential Biology with Physiology, Second Edition Neil Campbell, Jane Reece,
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System 1 M.Yasodha, 2 S. Umarani 1 PG Scholar, Department of Information Technology, Maharaja Engineering College,
Artificial Immune Systems and Applications for Computer Security
Università degli Studi di Milano Dipartimento di Tecnologie dell Informazione Artificial Immune Systems and Applications for Computer Security Antonia Azzini and Stefania Marrara Artificial Immune System
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
Intelligent Log Analyzer. André Restivo <[email protected]>
Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Bio-inspired mechanisms for efficient and adaptive network security
Bio-inspired mechanisms for efficient and adaptive network security Falko Dressler Computer Networks and Communication Systems University of Erlangen-Nuremberg, Germany [email protected]
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for
Information Technology Engineers Examination Network Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination Version 2.0
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
A solution for comprehensive network security
Applied mathematics in Engineering, Management and Technology 2 (6) 2014:22-26 www.amiemt-journal.com A solution for comprehensive network security Seyed Mehdi Mousavi Payam Noor University (PNU), IRAN
Trust Model for Hybrid Security Architecture Based on Reputation for Secure Execution of Mobile Agents
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 67-72 International Research Publications House http://www. irphouse.com /ijict.htm Trust
Fault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
[email protected]. Keywords - Algorithm, Artificial immune system, E-mail Classification, Non-Spam, Spam
An Improved AIS Based E-mail Classification Technique for Spam Detection Ismaila Idris Dept of Cyber Security Science, Fed. Uni. Of Tech. Minna, Niger State [email protected] Abdulhamid Shafi i
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Efficient Detection of Ddos Attacks by Entropy Variation
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2 1Department of Computer Engineering & Application, NITTTR, Shyamla Hills, Bhopal M.P.,
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
Multilevel Network Security Monitoring and Evaluation Model
806 JOURNA OF SOFTWARE, VO. 6, NO. 5, MAY 0 Multilevel Network Security Monitoring and Evaluation Model Jin Yang Department of Computer Science/eShan Normal Univ., eshan, China Email:[email protected] Tang
Content of smart wireless sensor network security and its network security policy
Abstract Content of smart wireless sensor network security and its network security policy Xiehua Yu Minnan Science and Technology Institute, Fujian Normal University, Fujian, 362332, China eceived 1 October
A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
A Visualization Technique for Monitoring of Network Flow Data
A Visualization Technique for Monitoring of Network Flow Data Manami KIKUCHI Ochanomizu University Graduate School of Humanitics and Sciences Otsuka 2-1-1, Bunkyo-ku, Tokyo, JAPAPN [email protected]
Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Comprehensive colliery safety monitoring system
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
specific B cells Humoral immunity lymphocytes antibodies B cells bone marrow Cell-mediated immunity: T cells antibodies proteins
Adaptive Immunity Chapter 17: Adaptive (specific) Immunity Bio 139 Dr. Amy Rogers Host defenses that are specific to a particular infectious agent Can be innate or genetic for humans as a group: most microbes
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
D A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
A Review on Intrusion Detection System based on Artificial Immune System
A Review on Intrusion Detection System based on Artificial Immune System Pavitra Chauhan Nikita Singh Nidhi Chandra ABSTRACT Various approaches from different fields have been proposed to improve the security
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
Fail-Safe IPS Integration with Bypass Technology
Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive
A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce
, pp.231-242 http://dx.doi.org/10.14257/ijsia.2014.8.2.24 A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce Wang Jin-Song, Zhang Long, Shi Kai and Zhang Hong-hao School
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
Design of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; [email protected]
Network Monitoring as an essential component of IT security
Network Monitoring as an essential component of IT security White Paper Author: Daniel Zobel, Head of Software Development, Paessler AG Published: July 2013 PAGE 1 OF 8 Contents Introduction... Current
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm
E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm Ismaila Idris Dept of Cyber Security Science, Federal University of Technology, Minna, Nigeria. [email protected]
Neural Networks in Data Mining
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V6 PP 01-06 www.iosrjen.org Neural Networks in Data Mining Ripundeep Singh Gill, Ashima Department
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
The Research in Remote and Real-time Monitoring System of Digitized Earthquake Omen Instrument
2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010) IPCSIT vol. 53 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V53.No.1.13 The Research in Remote and
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
Available online at www.sciencedirect.com Available online at www.sciencedirect.com
Available online at www.sciencedirect.com Available online at www.sciencedirect.com Physics Physics Procedia Procedia 00 (2011) 24 (2012) 000 000 2293 2297 Physics Procedia www.elsevier.com/locate/procedia
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
Remote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: [email protected] #D.Upender 2, Asst.Professor, E mail: [email protected] #Department
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Huawei Eudemon1000E-X series Firewall. Eudemon 1000E-X Series Firewall. Huawei Technologies Co., Ltd.
Eudemon 1000E-X Series Firewall Huawei Technologies Co., Ltd. Product Overview With the dramatic increase in threats to networks, users are become ever more concerned by application- and service-based
Method for detecting software anomalies based on recurrence plot analysis
Journal of Theoretical and Applied Computer Science Vol. 6, No. 1, 2012, pp. 3-12 ISSN 2299-2634 http://www.jtacs.org Method for detecting software anomalies based on recurrence plot analysis Michał Mosdorf
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Characteristics of Computational Intelligence (Quantitative Approach)
Characteristics of Computational Intelligence (Quantitative Approach) Shiva Vafadar, Ahmad Abdollahzadeh Barfourosh Intelligent Systems Lab Computer Engineering and Information Faculty Amirkabir University
Research of Smart Distribution Network Big Data Model
Research of Smart Distribution Network Big Data Model Guangyi LIU Yang YU Feng GAO Wendong ZHU China Electric Power Stanford Smart Grid Research Institute Smart Grid Research Institute Research Institute
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
The allocation algorithm for data centers in cloud computing architecture from security perspective
The allocation algorithm for data centers in cloud computing architecture from security perspective *Chuan-Gang Liu 1,Hsin-Yi Lin, Kun-Ta Hsien Deparament of Information Technology, Chia Nan University
Knowledge Based Context Awareness Network Security For Wireless Networks
Knowledge Based Context Awareness Network Security For Wireless Networks Deepa U. Mishra Department of Computer Engineering Smt. Kashibai Navale College of Engineering Pune, India Abstract - Context awareness
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia [email protected] Tianfu Fu [email protected] Cheng He Danping He [email protected]
SureSense Software Suite Overview
SureSense Software Overview Eliminate Failures, Increase Reliability and Safety, Reduce Costs and Predict Remaining Useful Life for Critical Assets Using SureSense and Health Monitoring Software What SureSense
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
