Use of Genetic Algorithm in Network Security
|
|
|
- Constance Hamilton
- 10 years ago
- Views:
Transcription
1 Use of Genetic Algorithm in Network Security L.M.R.J Lobo Professor, Department of Computer Science & Engg. Walchand Institute of Technology, Solapur, India Suhas B. Chavan MECSE (SEM IV), Department of Computer Science & Engg. Walchand Institute of Technology, Solapur, India ABSTRACT After overcoming some drawbacks from an improved genetic feedback algorithm based network security policy framework. A motivation was experienced for the need of a strong network security policy framework. In this paper a strong network model for security function is presented. A gene for a network packet is defined through fitness function and a method to calculate fitness function is explained. The basic attacks encountered can be categorized as buffer overflow, array index out of bound, etc. A stress is given on passive attack, active attack, its types and brute force attack. An analysis on recent attacks and security is provided. Finally the best policy using a comparator is found. The main aim of this paper is threat detection, time optimization, performance increase in terms of accuracy and policy automation. For experimenting real data set from the internet and local network is used. Jpcap, winpcap, Colasoft Capsa 7 open source software are used for implementation. 73% efficiency is achieved because we add 3 networking terms such as payload, checksum, and sequence number. A client server environment is made use of. General Terms Genetic algorithm, Network security, Crossover technique. Keywords Genetic algorithm, Network security policy framework, Fitness function. 1. INTRODUCTION In a client server communication, attackers need only little information for doing fraudulent transaction. A genetic algorithm is an example of evolutionary computing models and optimization-type algorithm. Chromosomes, which are DNA strings, provide the abstract model for a living organism. Subsections of the chromosomes, genes, are used to define different traits of the individuals. During Reproduction genes of the parents are combined to form genes for the child. Given an alphabet A, an individual or chromosome is a string I= I 1, I 2, I 3 In Where I A. Each character in the string, Ij, is called a gene. A population, P, is a set of individuals. Although individuals are often represented as bit strings, any encoding is possible. One of the most important components of a genetic algorithm is determining how to select an individual. A fitness function f is used to determine the best individuals in a population. This is then used in the selection process to choose parents. A policy based system has three basic steps in which it works i.e. creation, assignment and execution of policy. These depend on the network event type and requirement in terms of security. 2. RELATED WORK In improved genetic feedback algorithm based network security policy framework, the security model was much more simplified and implementable. Their future work included creating the network security framework and testing it on real data sets [1]. In An Evolutional network security policy framework based on gene-feedback algorithm paper, based on the historical security events, using genetic algorithm, they generated a rule base. When a new network event encountered, the analyzer judged whether the event was secure or not according to the rule base, and the policy system gave a policy decision too. Obviously, these two results differed. So the policies could be automatically adjusted, referring the genetic calculated results [2]. In a new interactive genetic algorithm (IGA) framework incorporating relevant feedback (RF) in which human evolution is regarded as not only the fitness function of the GA, but also the relevant score to instruct interactive machine learning. The two mapped functions between the low-level parameter space and the high-level users' psychological space built during interactions. The effectiveness of our approach was first evaluated through simulation tests using two benchmark functions. The experimental result showed that the convergence speed of the proposal was faster than that of normal IGA. Then the approach was applied to retrieve images with emotion semantics queries [3]. In Designing rule base for genetic feedback algorithm based network security policy framework using state machine paper, A genetic algorithm based policy management system judged the validity of network events according to the rules defined in the rule base. These rules were either IP address or some other parameters, such as a port number etc. This paper discussed the design and benefits of rule base which is based on finite state machine. Since a new networking event came, the process of judges the event should be less time consuming. This paper introduced how FSM could be used for representing and managing the rule base of a genetic feedback algorithm based network security framework in an efficient way [4]. In A Policy-based Management System with Automatic Policy Selection and Creation Capabilities by using a Singular Value Decomposing Technique paper, it described a novel method by which policies could be selected or created automatically based on events observed and knowledge learned. This new approach treats the observed event-policy relationship represented by an event-policy matrix as a statistical problem. Using Singular value decomposition (SVD) technique, implicit higher order correlations among 1
2 policies and their associated events were used to estimate the selection or creation of recommended policies based on events found in the observed event set [5]. In Storing Scheme for State Machine Based Rule Base of Genetic Feedback Algorithm Based Network Security Policy Framework Depending on Memory Consumption paper. Three types of storing schemes are discussed namely Time Efficient Storing which gave constant search time, second is Trade off Storing in this scheme how a trade-off could be done between space and time complexities to get a system according to availability of resources. The time complexity of this scheme would be in the range of 2n. Where n=2, 3 10 and the value of n is indirectly proportional to the space used. Whenever a * was encountered in the rule base it was stored in a simple linked list. In the data field * was stored and the link field would point to the next table or next link. For example whenever the system has to check whether the rule was present or not, it will see the start link and go to the index location a (i.e. Considering IPV4 addresses in the format a.b.c.d) and if the location at index a points to a table then it will go to that table. If index d points to the END link then the system terminated with successful search. In Trade off method they have stored the entries in the array of link list and simple links called spares with each link consisting of three fields one is Boolean data field and two pointer fields. The size of each array would be 2n, where n = 0 to 8. Worst case time complexity in the case of trade off sharing could be calculated by using simple formula i.e. Worst case time complexity = (256/2n) *p Where, n = 0 to 8, depending on the size of the array, and P is a number of parts in IP address i.e. p = 4 If IP version 4 is used and p=16 is IP version 6 is used. In Space efficient storing the link have three parts i.e. value part which stored value between and two pointer fields one pointer pointing the next value at the same level and the second pointer pointing the values at the next level. Here same level means the same octet of the address and next level means the next octet of the address. I.e. if the system is in a position of the IP address then it would go to the b octet of the address. Selection of storing scheme could be done on the basis of number of entries in the rule base i.e. if the number of entry was more than half of the total possible IP addresses then time efficient storing should be given preference [6]. In An Artificial intelligence perspective on autonomic computing policies, three policies were described i.e. Action policy, goal policy, Utility function policy. In action policy should be taken whenever the system is in a given current state. Typically this took the form of IF (Condition) THEN (Action), where Condition specified either a specific state or a set of possible states that all satisfy the given Condition. An implementing utility function required optimization algorithms. Because utility functions were a function of the states, it might appear easy and natural to use optimization to directly identify the most desirable state as a Goal from which actions could be derived via planning and/or modeling [7]. Reinforcement learning was the problem faced by an agent that learnt behavior through trial-and-error interactions with a dynamic environment. In this literature they have discussed central issues of reinforcement learning, including trading off exploration and exploitation, establishing the foundations of the field via Markov decision theory, learning from delayed reinforcement, constructing empirical models to accelerate learning, making use of generalization and hierarchy, and coping with hidden state. It concluded with a survey of some implemented systems and an assessment of the practical utility of current methods for reinforcement learning [8]. In Improved Algorithms for Finding Gene Teams and Constructing Gene Team Tree paper, a discusseion on gene team was covered. A set of gene that appear in two or more species, possibly in a different order yet with the distance between adjacent genes in the team for each chromosome always no more than a certain threshold \delta. A gene team tree was a succinct way to represent all gene teams for every possible value of \delta. In this paper, improved algorithms are presented for the problem of finding the gene teams of two chromosomes and the problem of constructed a gene team tree of two chromosomes [9]. In RFC 2753 a framework for policy-based admission control was given. Networking terms such as administrative domain, network element or node, policy, policy decision point, policy enforcement point has been discussed [10]. In Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System. They provided an intrusion detection system (IDS), genetic algorithm (GA) applied to a network intrusion detection system. Parameters and evaluation process for GA was discussed in detail and implemented. This approach used in information theory to filter the traffic data and thus reduce the complexity. They used a linear structure rule to classify the network behaviors into normal and abnormal behaviors. [11]. In Network Routing Protocol using Genetic Algorithms. This paper developed a genetic algorithm to solve a network routing protocol problem. The algorithm has to find the shortest path between the source and destination nodes. In the literature, the routing problem was solved using search graph techniques to find the shortest path. Dijkstra's algorithm was one of the popular technique to solve this problem. The developed genetic algorithm is compared with Dijkstra's algorithm to solve routing problem. Simulation results carried out for both algorithms using MATLAB. The results affirmed the potential of the proposed genetic algorithm. The obtained performance was similar to Dijkstra's algorithm. [12]. In network security policy framework and analysis paper. They have used signature rules for infected packet analysis. They have tested it on real data sets available on the internet with some automated software. As future expansion in this work, latest attack prevention can be dealt with [13]. In An Implementation of intrusion detection system using genetic algorithm. Secured data communication over the internet and any other network was always under threat of intrusions and misuses. So Intrusion Detection Systems have become a needful component in terms of computer and network security. They presented an Intrusion Detection System (IDS), through a genetic algorithm (GA). This detected efficiently and applied to various types of network intrusions. Parameters and evaluation processes for GA were discussed in details and implemented. This approach used evolution theory to inform evolution in order to filter the traffic data and thus reduce the complexity. To implement and measure the performance of our system we used the KDD99 benchmark datasets and obtained reasonable detection rate. [14]. 3. GENETIC ALGORITHM A pseudocode may be used to feature the steps taken in a Genetic Algorithm approach. 2
3 Input: P //Initial population Output: P //Improved population Genetic algorithm: repeat N= P P =Ø; repeat i 1, i 2 = select (P); o 1, o 2 = cross (i 1, i 2 ); o 1 = mutate (o 1 ); o 2 = mutate (o 2 ); P = P U {o 1, o 2 }; until P = N; P = P ; The process continues until the new population satisfies the termination condition. In genetic algorithms, reproduction is defined by precise algorithms that indicate how to combine the given set of individuals to produce new ones. These are called crossover algorithm. Given two individual parents from the population, the crossover technique generates new individuals (offspring or children) by switching subsequences of the strings. Table 1 illustrates the process of crossover. 3.1 SINGLE CROSSOVER Table 1: Reproduction (Crossover Algorithms) Parents 3.2 MULTIPLE CROSSOVER Children Table 2: Reproduction (Crossover Algorithms) until termination criteria satisfied; Algorithm.1: Working of Genetic Algorithm Parents Children Initially a population of individuals, P is created. Although different approaches can be used to perform this step, they typically are generated randomly. From this population, a new population, P, of the same size is created. The algorithm repeatedly selects individuals from whom create new ones. These parents i 1, i 2 are then used to produce two offspring, o 1, o 2 using a crossover process. Then mutants may be generated. The locations indicating the crossover points are shown in the Table 1 with the vertical lines. In Table 1 a crossover is achieved by interchanging the last three bits of the two strings. In Table 2 the center three bits are interchanged. As in nature however, mutations sometimes appear, and these may be present in genetic algorithms. The mutation operation randomly changes characters in the offspring. A very small probability of mutation is set to determine whether a character should change. 3
4 4. SYSTEM ARCHITECTURE Network Event Administrator GA-I Updated Signature Rules Policy management Point (Admin) Policy management Point (GA-II) Prevention Method Comparator Security Figure 1: Architecture of Proposed System Architecture of Proposed system is shown in Figure 1. It consists of following components Network Event Module In this module Administrator selects the network event or packets. Here each network event is analyzed and passes network event to the GA-I Administrator The user should be login with administrator so Jpcap and WinPcap tool can be detected the packets otherwise we could not be detect any packets Policy Management Component for Administrator In this module Administrator selects the policy and passes that policy to the comparator Genetic Algorithm Component (GA-I) GA-I used for packet analysis. We have analyzed server side packets also. We used vector class and analyzed n number of packets Policy Management Component for Genetic Algorithm Component (GA-II) Basically GA-II used for policy selection and prevention purposes. Here types of attacks are analyzed and its vulnerability checks Comparator In this component we are comparing two policies administrator policies and policy management point (GA-II). We are recycling policy and passing the comparator output to a network and we are choosing best of best policy Prevention Method Component In this component prevention method is applied to infected networking terms and passes the policy to Policy Management Point (GA-II) Security Component In this component security has been applied for the best of best policy. The database has been updated whenever we are analyzing lots of packets through the network. The subcomponents of Genetic Algorithm are shown in figure 1.2 The network security policy framework and analysis consist of following subcomponents: Gene Designer Gene designer is used to get input as a network packet. The properties can be source and destination IP address, port number, size of the packet, in case of security breach the level of threat and damage caused, depending on type of security breach Genetic Operation Unit In this component model genetic operations such as crossover, mutation, and selection apply to the initial set of the population selected by the administrator Gene Pool In this component the all the gene selected during genetic operation based on their fitness score are stored along with their fitness value for future references Gene Comparator In this component the gene generated by gene designer is compared with the gene present in the gene pool. If the gene is present in the gene pool then the output of the component is 4
5 forwarded to Event action model. If the gene is not present then the fitness value of the gene is calculated in the fitness calculator Fitness Calculator Here the fitness of the gene is calculated and if the score is more than the threshold value decided for the fitness function then the gene added in the gene pool and the output is sent to the network report generator. Here we used a genetic algorithm (GA-I) for packet analysis and (GA-II) for policy selection and prevention method. In packet capturing Jpcap and WinPcap tool is used for implementation for this paper. These are the open source software. We used Jpcap 0.7, Netbeans male-windows WinPcap and jdk-7 (Advance Java) used for implementation of this paper. Database saved in ms access. 4. Destination port number 5. Size of packet 6. Number of hops between the source and destination. 7. Time to Live (TTL) 8. Packet type 9. Payload 10. Checksum 11. Sequence number Here, THREAT is taken as the fitness function. So the THREAT value of each event is being calculated and if it is above the threshold decided, then the packet is considered as dangerous. Network Packet Gene Designer Gene Comparator F C n THREAT_VALUE = THREAT MATCH *weight i i=0 Table 2 Comparison Initial Genes Figure 2 Components of proposed System FC: -Fitness Calculator FITNESS FUNCTION There are many parameters that can influence the effectiveness of the genetic algorithm. The evaluation function is one of the most important and difficult parameters in genetic algorithms. First we define a formula to calculate whether a field of the connection matches the pre-classified data set. In a chromosome header fields are taken. The data type can be character, integer, double or an object. If a particular packet has been matched to a number of rules decided and we are calculating difference zero or one, then best delta value can be computed. n Match_Value = match*weight i i=0 Where n is the number of genes present in each chromosome. In our case gene means property that each network packet is to be checked for, here each network packet is equal to a chromosome. Some of the properties which might be considered as genes for a network event are as follows: 1. Source IP address. 2. Destination IP address 3. Source port number GA Operation Unit Gene Pool Existing system Proposed system 8 networking parameter 11 networking parameter Signature rules predefined Latest attack detection and prevention cannot be dealt with. Updated Signature rules are predefined. Latest attack detection and prevention method can be dealt with. 5. TYPES OF ATTACK DETECTION Most of the attack in an internet is based on hacking IP address in TCP (Transmission Control protocol), UDP (User datagram Protocol), ICMP (Internet Control Message Protocol), ARP (Address Resolution Protocol); We have developed attacker module and analyzed TCP, UDP, ICMP and ARP. Here we have analyzed which IP addresses Block and ICMP Block in an internet or LAN (Local Area Network). In the process module we are taking appropriate action for particular attack. In GA II analyzer module packet id and fitness value is stored. In our database packet ID and which packet you are checking its weight and threat value is stored. In our database packet ID and which packet you are checking its weight and threat value is stored. How many packets we have analyzed this is checked by enabling flag one in analyzed column. Weight and threat value is stored for UDP, TCP, ICMP and ARP Protocol. In GA II Process module Packet ID and fitness value is stored for any web site or we can say particular network. In process module whether the packet has been detected if the checked value is one in GA II. We are storing ID, PacketID, and fitness value in this module. Packet ID and fitness value is stored and which action we have to take whether it is IP Block or ICMP Block this overall content will be stored in policy 5
6 module for the purpose of prevention method. We have analyzed the active attack, passive attack. In ICMP (Internet Control Message Protocol) Source IP address remains same for Destination IP address this is also one type of attack. 6. RESULT 6.1 Efficiency of System. Testing Network Security Policy Framework and Analysis uses real data set is a difficult task. When infected packets found our system must be updated just like antivirus software. The following table shows the efficiency of the system. Total no of networking parameter checked in previous system Efficiency of System = * 100 Total no of networking parameter checked in our system Efficiency of System = * Efficiency of System = 73%. Above Efficiency shows that our developed system is working 73% correctly. Figure 3 indicates the pie chart for the efficiency of our system is indicated in blue portion (73 %). We have checked 11 networking parameter while the purple portion (27.28%) is indicating we haven t checked all the networking parameter st Qtr nd Qtr Figure 3 Efficiency of our system 7. CONCLUSION AND FUTURE WORK In network security policy, framework and analysis will run on the web server and its function to detect attack, threat value and weight. Network security policy framework and analysis are carried out using genetic algorithm. After detecting an attack, we have to choose best of best policy. Experimental results show the performance and effectiveness of our system and demonstrate the usefulness of Genetic Algorithm. Comparative studies reveal that the Accuracy of the system is close to 73 percent over a wide variation in the input data and results are good as compared to previous papers due to increasing the networking parameter. We have checked 11 networking parameter Following work would be possible. 1. A new model that is much more simplified and implementable was implemented, future work to this includes creating the network security framework and testing it on real data set available on the internet. 2. In this model approximately eleven signature rules are predefined. As future expansion in this work, latest attack prevention can be dealt with. 3. It s possible to implement the overall thesis through cluster but it will require large time complexity as compared to the genetic algorithm. 8. REFERENCES [1] Atish Mishra, Arun Kumar Jhapate, Prakash Kumar, Improved Genetic Feedback Algorithm Based Network Security Policy Framework in Second International Conference on Future Networks on page [2] Chen Xiao-su Wu Jin-hua Ni Jun 2007 in Wireless Communications, Networking and Mobile Computing, WiCom 2007.Internatinal Conference on page [3] Hang-Fei Wang, Xu-Fa Wang and Jia Xue. An Improved Interactive Genetic Algorithm Incorporating Relevant Feedback [4] Atish Mishra, Arun Kumar Jhapate and Prakash Kumar, 2009 Designing Rule base for Genetic Feedback Algorithm Based Network Security policy Framework using State Machine on pp at International Conference on Signal Processing Systems. [5] Hoi Chan; Kwok, T.; IBM Thomas J. Watson Res. Center, Hawthorne, NY June 2006 A Policy-Based Management System with Automatic Policy Selection and creation capabilities by using a Singular Value Decomposition Technique. [6] Atish Mishra, Prakash Kumar 2009 Storing Scheme for State Machine Based Rule Base of Genetic Feedback Algorithm Based Network Security Policy Framework Depending on Memory Consumption at IACSIT vol, 3 Singapore. [7] Jeffrey O. Kephart and William E.Walsh IBM Thomas J. Watson An Artificial Intelligence Perspective on Automatic Computing Policies at Research Center Yorktown Heights, New York [8] L.P.Kaelbling, M. L. Littman, A. W. Moore. Reinforcement Learning: A Survey [9] Biing Feng Wang, Chien-Hsin Lin. Improved Algorithms for Finding Gene Teams and Constructing Gene Team Trees [10] R. Yavatkar,D.Pendarakis, R. Guerin, January 2000, RFC 2573, A Framework for Policy-based Admission Control, 6
7 [11] B. Abdullah*, I. Abd-alghafar**, Gouda I. Salama** and A. Abd-alhafez, Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System in 13th International Conference on AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT- 13, May 26 28, [12] Gihan Nagib and Wahied G. Ali, Network Routing Protocol using Genetic Algorithms in International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 10 No: March [13] Suhas Chavan, L.M.R.J Lobo Network Security Policy Framework and Analysis in International Journal of Computer Application special issue on Network Security and Cryptography NSC (1):55-58, December spe014t [14] Mohammad Sazzadul Hoque1, Md. Abdul Mukit2 and Md. Abu Naser Bikas An implementation of intrusion detection system using genetic algorithm in International journal of network security & its applications (ijnsa), Vol.4, No.2, march
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
Numerical Research on Distributed Genetic Algorithm with Redundant
Numerical Research on Distributed Genetic Algorithm with Redundant Binary Number 1 Sayori Seto, 2 Akinori Kanasugi 1,2 Graduate School of Engineering, Tokyo Denki University, Japan [email protected],
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
USING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Assignment 6: Internetworking Due October 17/18, 2012
Assignment 6: Internetworking Due October 17/18, 2012 Our topic this week will be the notion of internetworking in general and IP, the Internet Protocol, in particular. IP is the foundation of the Internet
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing
Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Smart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang([email protected]) & Liu Tang([email protected])
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
Clustering on Large Numeric Data Sets Using Hierarchical Approach Birch
Global Journal of Computer Science and Technology Software & Data Engineering Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013
Transistor Level Fault Finding in VLSI Circuits using Genetic Algorithm Lalit A. Patel, Sarman K. Hadia CSPIT, CHARUSAT, Changa., CSPIT, CHARUSAT, Changa Abstract This paper presents, genetic based algorithm
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
CS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Gamil R. S. Qaid 1, Sanjay N. Talbar 2 1 Research Student, Electronics & Telecommunications Dept.,S.G.G.S. institute
Genetic Algorithms commonly used selection, replacement, and variation operators Fernando Lobo University of Algarve
Genetic Algorithms commonly used selection, replacement, and variation operators Fernando Lobo University of Algarve Outline Selection methods Replacement methods Variation operators Selection Methods
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Evolutionary SAT Solver (ESS)
Ninth LACCEI Latin American and Caribbean Conference (LACCEI 2011), Engineering for a Smart Planet, Innovation, Information Technology and Computational Tools for Sustainable Development, August 3-5, 2011,
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Traffic Analyzer Based on Data Flow Patterns
AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Applying Genetic Algorithm to Intrusion Detection System
Applying Genetic Algorithm to Intrusion Detection System Vrishali Yewale 1, Vimla Jethani 2, Tushar Ghorpade 3 1 Computer Science Department, Mumbai University, RAIT College of Engineering, Nerul, Navi
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)
Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,
A Tokenization and Encryption based Multi-Layer Architecture to Detect and Prevent SQL Injection Attack
A Tokenization and Encryption based Multi-Layer Architecture to Detect and Prevent SQL Injection Attack Mr. Vishal Andodariya PG Student C. U. Shah College Of Engg. And Tech., Wadhwan city, India [email protected]
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
Network Based Intrusion Detection System using Genetic Algorithm: A Study
Network Based Intrusion Detection System using Genetic Algorithm: A Study 1 Purushottam Patil, 2 Dr. Yogesh Sharma and 3 Dr. Manali Kshirsagar 1 Research Scholar (Computer Science & Engineering), Faculty
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
IP Multicasting. Applications with multiple receivers
IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data
An Application of Machine Learning to Network Intrusion Detection
An Application of Machine Learning to Network Intrusion Detection Chris Sinclair Applied Research Laboratories The University of Texas at Austin sinclair@arlututexasedu Lyn Pierce epierce@arlututexasedu
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
Genetic Algorithm Based Interconnection Network Topology Optimization Analysis
Genetic Algorithm Based Interconnection Network Topology Optimization Analysis 1 WANG Peng, 2 Wang XueFei, 3 Wu YaMing 1,3 College of Information Engineering, Suihua University, Suihua Heilongjiang, 152061
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Establishing a valuable method of packet capture and packet analyzer tools in firewall
International Journal of Research Studies in Computing 2012 April, Volume 1 Number 1, 11-20 Establishing a valuable method of packet capture and packet analyzer tools in firewall Kumar, P. Senthil Nandha
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm
, pp. 99-108 http://dx.doi.org/10.1457/ijfgcn.015.8.1.11 Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm Wang DaWei and Wang Changliang Zhejiang Industry Polytechnic College
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Exam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
GCE Computing. COMP3 Problem Solving, Programming, Operating Systems, Databases and Networking Report on the Examination.
GCE Computing COMP3 Problem Solving, Programming, Operating Systems, Databases and Networking Report on the Examination 2510 Summer 2014 Version: 1.0 Further copies of this Report are available from aqa.org.uk
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Padma Charan Das Dept. of E.T.C. Berhampur, Odisha, India
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Measuring Quality
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
ACKNOWLEDGMENT. I would like to thank Allah for giving me the patience to work hard and overcome all the
ACKNOWLEDGMENT I would like to thank Allah for giving me the patience to work hard and overcome all the research obstacles. My full gratitude is to Dr. Mohammed Al-Jarrah and Dr. Izzat Alsmadi for their
Network Layers. CSC358 - Introduction to Computer Networks
Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup
Software Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
Internet Protocol Version 6 (IPv6)
Internet Protocol Version 6 (IPv6) Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 14-1 Overview
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Lecture 8. IP Fundamentals
Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System 1 M.Yasodha, 2 S. Umarani 1 PG Scholar, Department of Information Technology, Maharaja Engineering College,
Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
and InMon Traffic Sentinel
Netzwerkkonzept Informationsveranstaltung am 03.07.2007 Im Bristol Hotel Mainz Ideen zum Netzwerkdesign - Switching -WLAN - Security - VoIP Datum: 03.07.2007, Seite: 1 InMon Traffic Sentinel Complete network
Network Protocol Configuration
Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
1) Explain the following evolutionary process models: a) The spiral model. b) The concurrent development model.
(DMSIT 21) ASSIGNMENT - 1, MAY-2014. PAPER- I : SOFTWARE ENGINEERING 1) Explain the following evolutionary process models: a) The spiral model. b) The concurrent development model. 2) What are requirements
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
