A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM
|
|
|
- Maria Robbins
- 10 years ago
- Views:
Transcription
1 A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM Walid Mohamed Alsharafi and Mohd Nizam Omar Inter Networks Research Laboratory, School of Computing, College of Arts and Sciences, Universiti Utara Malaysia, UUM Sintok, Malaysia ABSTRACT Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection. The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. One of the most operational improvements in the standard of NSA is how to generate effective detectors which play a significant role in self and nonself discrimination in intrusion detection system (IDS). In this paper, we offer an improvement to a detector generating algorithm to generate effective detectors which leads to improve the standard of NSA, which in turn leads to improve the NSA based anomaly intrusion detection. Experimental results show that the improved algorithm able to generate more effective detectors and keeping the space and time complexities better than in the standard of NSA. This leads to detecting the real-time intrusion with less false negative. Keywords: detector, detector generating algorithm, negative selection, intrusion detection. INTRODUCTION Intrusion detection is a significant component of information processing system protection. It provides an additional layer of defense against computer abuse after physical, authentication and access control (Dasgupta, 1999). The anomaly intrusion detection identifies the intrusion by the comparison between abnormal (i.e. anomaly) activities and the normal one of the protected system. The normal activities are maintained in the established normal profile which holds the model of the effective normal activity and detection methods. In order to resolve the problem in anomaly intrusion detection, there are some ways of Artificial Intelligence (AI) such as data mining, neural network, and artificial immune system (AIS). The AIS is a sub-field of computing inspired by the biological natural immune system. AIS gets us to inspire several ideas for solving intrusion problems by emulating the biological natural immune mechanism to discriminate "self" and "nonself": where "self" could be specified as many things, such as normal behavior, normal network traffic between computers and so on. One of the basic and most common approaches in AIS is the Negative Selection Approach (NSA), which is simple and easy to implement. It was employed in many studies, but mostly in anomaly detection for the similarity of its basic idea (Aziz, Azar, Hassanien and Hanafy, 2014). The standard of NSA has been offered in Since that time, a number of works have been proposed to improve the NSA standard so that it can be applied in designing real-time IDS. The algorithm proposed by Xian (Xian, 2009) has drawn our attention because of its simple idea of generating the effective detectors with less space and time complexities, comparing with the standard NSA, which run to design real-time NSA based anomaly IDS but, however, it costs a lot of false negative because the number of the generated effective detectors is quite small. Therefore, in this paper, we improve the work in (Xian, 2009) to generate more effective detectors for NSA based anomaly IDS with a low percentage of false negative as well as with less space and time complexities. NEGATIVE SELECTION MECHANISM Negative selection principle in biological immune system The human immune system (IS) is a truly amazing constellation of responses to attacks from outside the body. It has many facets, a number of which can switch to optimize the response to these unwanted intrusions (Haldar and Ahmad, 2010). The system is unusually effective, most of the time. The interaction among the IS and several other systems and organs allows the regulation of the body, ensuring its stable operation. The effect of this mechanism is that the IS is capable of distinguishing between organism's self cells and nonself cells. This procedure identifies the principle of negative selection of the organism's cells. Negative selection allows only the existence of those cells that do not recognize self cells. The cells are produced and undergo a maturation process known as immune tolerance in the thymus gland and bone marrow respectively, after that they are permitted to convey constituent in an immune response. In immune tolerance, cells will die if they have matched with self cells, and if not, they will become mature cells, and function as the true immune competent cells. Negative selection algorithm in artificial immune system The process of detection anomaly intrusion in a computer system can be considered as the process of distinguishing "self" and "nonself" in the immune system. In the light of this thought, Stephanie Forrest lead a research group in New Mexico University and proposed the immune negative selection algorithm in 1994 (Forrest, 608
2 Perelson, Allen and Cherukuri, 1994). In essence of this algorithm is to generate a set of detectors which do not recognize "self" but distinguish the "nonself" (viruses, worms, Trojan horses, spyware, unauthorized access, etc.) from "self" (protected data files, authorized users, etc.) (Forrest, Perelson, Allen and Cherukuri, 1994). This algorithm comprises two phases (Forrest, Hofmeyr, Somayaji and Longstaff, 1996): censoring and monitoring. The censoring stage serves for the generation of mature detectors which monitor the system being protected for changes. The algorithm builds a lot of competent detectors in the following steps (see Figure-1): Step 1: define a set of self (S). The data being protected is viewed as a string. The string is split into several l-length substrings. The set of self S consists of several substrings. Step 2: generate a set of random candidate detectors (Ro). They are also l-length strings and generate in some probability analytical ways. Step : generate a set of competent detectors (R). Strings from Ro that match self are eliminated. Strings that do not match any of the strings in S become members of the detector collection R. This step is called censoring. Step 4: monitor the changes of self. This is accomplished by continually choosing one detector in R and testing to find out if it matches with strings in S. If the self string matches one of the detector strings, a change would happen in S. Those changes are done probably for intrusion, virus or misusing. This step is called monitoring. which can generate effective detectors in NSA based anomaly intrusion detection. This algorithm is better than the detector generating algorithm which offered by Forrest in 1996 on the speed and efficiency of generating detectors (Xin, 2009). The terms related to this algorithm and to our proposed improvement are defined in Table-1. Table-1. Definition of terms used in the algorithm. The Rule of r-contiguous bits matching The r-contiguous bits matching rule states that the two character strings are matching if both strings have at least r bit continuous identical beginning from a particular position. (Ayara, Timmis, de Lemos, de Castro and Duncan, 2002). In Figure-2: if m =2, l =6, r =, we can consider S1 = and S2 = are matching. Figure-2. R-contiguous bits matching rule. Figure-1. The generation of the repertoire (i.e. the competent detectors) by using the alphabet (0, 1) with r = 2 (Forrest, Perelson, Allen and Cherukuri, 1994). ARTIFICIAL IMMUNE NEGATIVE SELECTION ALGORITHM FOR THE ANOMALY INTRUSION DETECTION Here, we propose an improvement to the algorithm of detector genrating offered in (Xian, 2009) Detectors generating algorithm ` We use the idea of the algorithm proposed in (Xin, 2009) to get a more efficient algorithm of detector generating. If m, l and N S are given, then the competent detectors (N R) can be generated. First, we give the following definition: C: a character array of the length l, it is used to keep every new generated detector tentatively. Si: a substring of C, starting from the position i and its length is r (1 i l r +1). The improved detector generating algorithm is presented as a flow diagram in Figure-. 609
3 Figure-. The improved detector generating algorithm. Figure-4 shows the example of generating process of a new detector '001111' using the Thread 2 of the improved detector generating algorithm shown in Figure-. Choosing the bit string ' 00 ', Initial array C So, C = 0 0 Set C[2] = ' 1 ', then C = s 1 S1 1 S2 1 S S4 1 S 1 S6 1 Not Match Set C[] = ' 1 ', then C = s 2 S1 2 S2 2 S S4 2 S 2 S6 2 Not Match Set C[4] = ' 1 ', then C = s S1 S2 S S4 S S6 Not Match Set C[] = ' 1 ', then C = s 4 S1 4 S2 4 S S4 4 S 4 S6 4 Not Match The end C = C array is a new competent detector ' ' Figure 4: generating process of the detector ' ' The Example in Figure-4: when we set m = 2, l = 6, r = and self collection includes 6 strings (i.e. N S = 6): S1= , S2= , S=111100, S4=110101, S= and S6=100100, the algorithm generates 2 r-1 = 4 possible bit strings: ' 00 ', ' 01 ', ' 10 ' and ' 11 ', and then use them to initialize successively character array C. For example, if we choose the bit string ' 00 ', then Figure-4 shows how to generate the detector ' ' using the Thread 2 of the flowchart in Figure-. The Thread will generate another detector which is '000000'. Figure- shows the string space map that results from both Thread 2 and Thread of the flowchart with the same abovementioned sets (i.e. r =, l = 6, m = 2 and N S = 6) x x x x x x Detector strings x x x x x x Detected strings x x x x x x Self strings x x x x x x Holes strings Figure : Example of string space map that shows results of applying the offered algorithm when set: r =, l = 6, m = 2 and Ns =
4 The time complexity of the algorithm is decided by the time to generate 2 r 1 possible combinations and the time to extend detector by each combination. So the time complexity is o(2 r 1 (l r + 1)N S). The space complexity is determined by the size of the array C. So the space complexity is o(l). The complexity of space and time of this algorithm is the same as in the algorithm proposed in (Xian, 2009). However the efficiency of our algorithm is better because its ability to generate more competent detectors (N R) with less holes (N H) which leads to decrease the probability of failing to detect nonself (P f) significantly. Compute the "Holes" In accordance with the above-mentioned matching rule and self collection strings S, for some nonself strings, called holes, it is impossible to generate valid detectors, i.e. the hole string will never match any of the generated detectors. When the self collection has two strings like this: beginning with some assigned place and having the same numbers in more than r -1 adjacency bit, there are at least two holes which can t be detected by any detector. Unfortunately the holes can not be avoidable. But too many holes mean that there are too many nonselfs which can not be detected, and there are also too much intrusion that can t be detected (Xin, 2009). RESULTS AND DISCUSSIONS The Table-2 shows experimental results based on the detector generating algorithm. Table-2. Experimental results N R N H N D P f Self Collection l N N Example S N NS r (a) (b) S1=1101, S2=1001, S=1111, S4= S1=1101, S2=1001, S=1111, S4= S=1100, S6= S1=110100, S2=100101, S=111100, S4=110101, S=110110, S6= S1=110100, S2=100101, S=111100, S4=110101, S=110110, S6=100100, S7=110111, S8= S1= S2= , S= S4= , S= S6= , S7= S8= S1= S2= , S= S4= , S= S6= , S7= S8= , S9= S10= In Table-2 each of the columns N R, N H, N D and P f depicts the values resulted from two different experiments (a) and (b), where the experiment (a) represents the algorithm proposed in (Xin, 2009), whereas the experiment (b) represents the algorithm with the improvement which we offer to get a better detector generating algorithm regarding the efficiency. It is clear from the results in the Table-2 that the sizes of competent detectors (N R) in experiment (b) almost double comparing with the corresponding sizes in the experiment (a). This lead to that the sizes of the detected nonself (N D) in experiment (b) almost double comparing with the corresponding sizes in the experiment (a) and this lead in turn to that: 1) the sizes of holes (N H) in experiment (b), is less comparing with the corresponding sizes in the experiment (a). 2) The probability of failing to detect non-self (P f) in experiment (b) gradually decreases comparing with the corresponding values in the experiment (a). As it was mentioned in the previous section, too many holes mean that there is too much intrusion that can t be detected which means too much false negative reported by the anomaly IDS. With this in mind and through the analysis of the results in the Table-2, it is clear that the anomaly IDS that would be developed using our improved algorithm will report less false negative than those reported by the anomaly IDS which would be developed using the algorithm proposed in (Xin, 2009). This is because, as we explained above, the size of holes resulted by our improved algorithm is quite less comparing with the corresponding size of holes resulted using the algorithm proposed in (Xin, 2009). CONCLUSION AND FUTURE WORK In this paper, we offered an improved and efficient algorithm for generating effective detectors needed to improve the performance of the standard NSA, which in turn can be used in computer intrusion detection design. We tested the algorithm to study: (1) its detector generating efficiency. (2) non-self detecting efficiency. The results demonstrate both, the efficiency of the detector generating and the efficiency of non-self detecting. Besides that, the improved algorithm keeps the space and time complexities better than the standard of NSA. This leads to detecting the real-time intrusion with less false negative. Therefore, our future work is to investigate the degree to which the proposed algorithm is able to integrate with the anomaly IDS architecture proposed in our previous work (Omar & Alsharafi, 201) to enhance and improve the efficiency of the anomaly IDS model. We also plan to use the standard of NSA and the proposed detector generating algorithm to investigate whether is it possible to invent what we will call Abnormal Profile as a new concept in anomaly IDS beside the well known Normal profile concept. The expected abnormal profile will contains the effective detectors, generated by the NSA, which take on a significant role in self and nonself discrimination for anomaly IDS. 611
5 REFERENCES Ayara M., Timmis J., de Lemos R., de Castro L. N. and Duncan, R. (2002). Negative selection: How to generate detectors. In Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS). 1: Canterbury, UK: [sn]. Aziz A. S. A., Azar A. T., Hassanien A. E. and Hanafy S. E. O Negative Selection Approach Application in Network IDSs. arxiv preprint arxiv: Dasgupta D Immunity-based intrusion detection system: a general framework. In: Proc. of the 22 nd NISSC. 1: Forrest S., Perelson A. S., Allen L. and Cherukuri R Self-nonself discrimination in a computer. In 2012 IEEE Symposium on Security and Privacy. IEEE Computer Society. pp Forrest S., Hofmeyr S. A., Somayaji A. and Longstaff T. A A sense of self for unix processes. In Security and Privacy, Proceedings., IEEE Symposium on pp Haldar C. and Ahmad R Photoimmuno-modulation and melatonin. Journal of Photochemistry and Photobiology B: Biology. 98(2): Omar M. N. and Alsharafi W. M A Normal Profile Updating Method for False Positives Reduction in Anomaly Detection Systems. In: The Second International Conference on Informatics Engineering and Information Science (ICIEIS201). The Society of Digital Information and Wireless Communication. pp Xin D. S. R. L The anomaly intrusion detection based on immune negative selection algorithm. Granular Computing, 2009, GRC'09. IEEE International Conference on
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
[email protected]. Keywords - Algorithm, Artificial immune system, E-mail Classification, Non-Spam, Spam
An Improved AIS Based E-mail Classification Technique for Spam Detection Ismaila Idris Dept of Cyber Security Science, Fed. Uni. Of Tech. Minna, Niger State [email protected] Abdulhamid Shafi i
Computational intelligence in intrusion detection systems
Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick Chang @ TEIL Reference The use of computational intelligence in intrusion detection systems : A review
A Review on Intrusion Detection System based on Artificial Immune System
A Review on Intrusion Detection System based on Artificial Immune System Pavitra Chauhan Nikita Singh Nidhi Chandra ABSTRACT Various approaches from different fields have been proposed to improve the security
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Artificial Immune Systems and Applications for Computer Security
Università degli Studi di Milano Dipartimento di Tecnologie dell Informazione Artificial Immune Systems and Applications for Computer Security Antonia Azzini and Stefania Marrara Artificial Immune System
Research on Network Security Situation Awareness Technology based on AIS SunJun Liu 1 1 Department of Computer Science
International Journal of Knowledge www.ijklp.org and Language Processing AKLP International c2011 ISSN 2191-2734 Volume 2, Number 2, April 2011 pp. 23-34 Research on Network Security Situation Awareness
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
Observation and Findings
Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network
Procedia Computer Science
Procedia Computer Science 00 (2011) 000 000 Procedia Computer Science www.elsevier.com/locate/procedia WCIT-2011 Host Based Anomaly Detection Using a Combination of Artificial Immune Systems and Hypervisor
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
IMPROVED OFF-LINE INTRUSION DETECTION USING A GENETIC ALGORITHM
IMPROVED OFF-LINE INTRUSION DETECTION USING A GENETIC ALGORITHM Pedro A. Diaz-Gomez Ingenieria de Sistemas, Universidad El Bosque Bogota, Colombia Email: [email protected] Dean F. Hougen Robotics, Evolution,
Immunity-Based Intrusion Detection System: A General Framework
Immunity-Based Intrusion Detection System: A General Framework Dipankar Dasgupta Division of Computer Science Mathematical Sciences Department The University of Memphis Memphis, TN 38152 Phone (901) 678-4147
Intrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
Identifying Online Credit Card Fraud using Artificial Immune Systems
Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title Identifying online credit card fraud using
An Efficient Three-phase Email Spam Filtering Technique
An Efficient Three-phase Email Filtering Technique Tarek M. Mahmoud 1 *, Alaa Ismail El-Nashar 2 *, Tarek Abd-El-Hafeez 3 *, Marwa Khairy 4 * 1, 2, 3 Faculty of science, Computer Sci. Dept., Minia University,
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila
Data Mining For Intrusion Detection Systems Monique Wooten Professor Robila December 15, 2008 Wooten 2 ABSTRACT The paper discusses the use of data mining techniques applied to intrusion detection systems.
USING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems using ANN
Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Guidelines for Establishment of Contract Areas Computer Science Department
Guidelines for Establishment of Contract Areas Computer Science Department Current 07/01/07 Statement: The Contract Area is designed to allow a student, in cooperation with a member of the Computer Science
Biological Models of Security for Virus Propagation. in Computer Networks. Sanjay Goel & Stephen F. Bush. Abstract
Biological Models of Security for Virus Propagation in Computer Networks Sanjay Goel & Stephen F. Bush Abstract This article discusses the similarity between propagation of pathogens (viruses and worms)
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Bio-inspired mechanisms for efficient and adaptive network security
Bio-inspired mechanisms for efficient and adaptive network security Falko Dressler Computer Networks and Communication Systems University of Erlangen-Nuremberg, Germany [email protected]
Modeling System Calls for Intrusion Detection with Dynamic Window Sizes
Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Eleazar Eskin Computer Science Department Columbia University 5 West 2th Street, New York, NY 27 [email protected] Salvatore
Face Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm
E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm Ismaila Idris Dept of Cyber Security Science, Federal University of Technology, Minna, Nigeria. [email protected]
SIGNATURE BASED INTRUSION DETECTION IN CLOUD BASED MULTI-TENANT SYSTEM USING MTM ALGORITHM
SIGNATURE BASED INTRUSION DETECTION IN CLOUD BASED MULTI-TENANT SYSTEM USING MTM ALGORITHM N.Thirumoorthy 1, M.Aramudhan 2 and M.S.Saravanan 3 1 Department of Computer Science, Jayalakshmi Institute of
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
A Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
IDS : Intrusion Detection System the Survey of Information Security
IDS : Intrusion Detection System the Survey of Information Security Sheetal Thakare 1, Pankaj Ingle 2, Dr. B.B. Meshram 3 1,2 Computer Technology Department, VJTI, Matunga,Mumbai 3 Head Of Computer TechnologyDepartment,
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Information Technology Center of Kabul(ITCK) Kabul University Prepared by: Humaira Saifi [email protected]
Information Technology Center of Kabul(ITCK) Kabul University Prepared by: Humaira Saifi [email protected] 1 By the end of this chapter you will understand : Windows Security Windows fire wall Open
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
INTRUSION DETECTION SYSTEM FOR WEB APPLICATIONS WITH ATTACK CLASSIFICATION
Volume 3, No. 12, December 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info INTRUSION DETECTION SYSTEM FOR WEB APPLICATIONS WITH ATTACK CLASSIFICATION
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Switching between the AES-128 and AES-256 Using Ks * & Two Keys
36 IJCSNS International Journal of Computer Science and Network Security, VOL.0 No.8, August 200 Switching between the AES-28 and AES-256 Using Ks * & Two Keys Moceheb Lazam Shuwandy, Ali Khalil Salih,
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif
Cloud Resilient Architecture (CRA) -Design and Analysis Glynis Dsouza Hamid Alipour Salim Hariri Youssif-Al-Nashif NSF Center for Autonomic Computing University of Arizona Mohamed Eltoweissy Pacific National
Training Course on Network Administration
Training Course on Network Administration 03-07, March 2014 National Centre for Physics 1 Network Security and Monitoring 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 Crafting a Secure
Using Artificial Intelligence in Intrusion Detection Systems
Using Artificial Intelligence in Intrusion Detection Systems Matti Manninen Helsinki University of Technology [email protected] Abstract Artificial Intelligence could make the use of Intrusion Detection
Intrusion Detection from Simple to Cloud
Intrusion Detection from Simple to Cloud ICTN 6865 601 December 7, 2015 Abstract Intrusion detection was used to detect security vulnerabilities for a long time. The methods used in intrusion detection
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi School of Computing Queen s University Kingston, Ontario,
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS
1 NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS ALAN BIVENS [email protected] RASHEDA SMITH [email protected] CHANDRIKA PALAGIRI [email protected] BOLESLAW SZYMANSKI [email protected] MARK
A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan
, pp.217-222 http://dx.doi.org/10.14257/ijbsbt.2015.7.3.23 A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan Muhammad Arif 1,2, Asad Khatak
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
An Intelligent Firewall to Detect Novel Attacks
An Intelligent Firewall to Detect Novel Attacks An Integrated Approach based on Anomaly Detection Against Virus Attacks InSeon Yoo and Ulrich Ultes-Nitsche Department of Electronics and Computer Science,
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2 1Department of Computer Engineering & Application, NITTTR, Shyamla Hills, Bhopal M.P.,
