Applying Genetic Algorithm to Intrusion Detection System
|
|
|
- Audrey Watkins
- 9 years ago
- Views:
Transcription
1 Applying Genetic Algorithm to Intrusion Detection System Vrishali Yewale 1, Vimla Jethani 2, Tushar Ghorpade 3 1 Computer Science Department, Mumbai University, RAIT College of Engineering, Nerul, Navi Mumbai, India 2, 3 Proessor, Computer Science Department, Mumbai University, RAIT College of Engineering, Nerul, Navi Mumbai, India Abstract: Now a days it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. With the rapid expansion of Internet in recent years; computer systems are facing increased number of security threats. Therefore, unwanted intrusions take place when the actual software systems are running. So Intrusion Detection Systems have become a needful component in terms of computer and network security. In this paper, we present an Intrusion Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network attacks. Parameters and evolution processes for GA are discussed. Also impact on rate of GA operators in IDS for misuse is discussed. Keywords: Misuse Intrusion detection, Genetic Algorithm (GA), Intrusion Detection System (IDS), Fitness Function. 1. Introduction The local area networks and internet gives a convenient and better technology for the users with fast growth. Even though the emerging technology is more beneficial for the users of the computer systems the security threats are also increasing at a high rate. Organizations are utilizing different technologies to secure the computer system from the network attacks by using firewall, antivirus software, password protection, message encryption etc., to overcome the threats. It is a difficult task to provide complete security to the system though we have various protection techniques. To recognize the attacks and detect the intrusions the intrusion detection technology is more useful. Intrusion is an activity performed by a person by breaking into an information system or performing an illegal action. Such person is termed as an intruder [1].Intruders can be divided into two groups, external and internal. The former refers to those who do not have authorized access to the system and who attack by using various penetration techniques and later refers to those with access permission who wish to perform unauthorized activities. Intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusions Detection can be classified into two main categories [4]. They are as follow: A. Host Based Intrusion Detection: A host-based IDS monitors file and process activities related to a software environment associated with a specific host. Some host-based IDSs also listen to network traffic to identify attacks against a host. B. Network Based Intrusion Detection: It refers to systems that identify intrusions by monitoring traffic through network devices (e.g. Network Interface Card, NIC).NIDSs evaluate information captured from network communications, analysing the stream of packets which travel across the network. Intrusion detection system has two analysis approaches based on detection engine: A. Misuse/Signature-Based Detection A misuse detection engine detects intrusions that follow wellknown patterns of attacks or signatures that exploit known software vulnerabilities. The signature can be a static string or a set sequence of actions. System responses are based on identified penetrations through signature for which IDS search but the main limitation of this approach is that it only looks for the known weaknesses and may not find unknown future intrusions. B. Anomaly/Statistical Detection An anomaly based detection engine will search for something rare that is whose instances are not known. They analyses system event streams, using statistical techniques to find patterns of activity that appear to be abnormal. It refers to techniques that define and characterize normal or acceptable behaviours of the system like CPU usage, job execution time, system calls [3, 4]. Behaviours that deviate from the expected normal behaviour are considered intrusions. But the disadvantages of this system are that they are highly expensive and they can recognize an intrusive behavior as normal behavior because of lack of data. Genetic Algorithms are another machine learning approach based on the principles of evolutionary computation [3]. They incorporate the concept of Darwin s theory and natural selection to generate a set of rules that can be applied on a testing set to classify intrusions [2, 3, 11]. Many researchers have explored the use of GAs in intrusion detection, and reported very high success rates, but on data sets other than the KDD 99 Cup, such as the DARPA data set. We have designed a GA that creates classification rules, wherein each rule has been evolutionary generated to classify every attack type in the training and testing data set. GA allows us to define our own fitness function based on which only those members or rules or hypothesis are selected that Paper ID: SUB
2 satisfy our fitness criterion. So we analyses different fitness function formulae. Document is a template. An electronic copy can be downloaded from the conference website. For questions on paper guidelines, please contact the conference publications committee as indicated on the conference website. Information about final paper submission is available from the conference website. 2. Related Work In recent years, Intrusion Detection System (IDS) has become one of the hottest research areas in Computer Security. Anup Goyal And Chetan Kumar[2],suggested systematic learning method known as Genetic Algorithm (GA),to identify illegitimate nodes. The algorithm considers the varied features in network connectivity like protocol type, network service to destination and connection status to generate a type based rules. This was experimented by implementing in GA and trained it on the KDD Cup 99 data set to generate rules that can be applied to the IDS to categorize the attack types. Aditya Chitturs[5],Presents a novel approach to detect the malicious intrusions (hacks) by using a complex artificial intelligence method known as GA applied to IDS. GA was also successfully evolved an individual s model through randomized mutation. The model generated over subset data was successfully be able to apply its empirical knowledge to data not seen before. Wei Lu and Issa Traore[6] evaluated a GP based approach for detecting known or novel attacks on network.the implementation shows that new rules generated by GP have a potential capability to detect novel forms of attacks. However, the detection result is not good for some runs because the selection of crossover and mutation points in corresponding operations in random. In addition, deciding the probability of genetic operators selection is experience based. Pedro A. Diaz-Gomez et al [7] used evolution process set of possible solutions were generated randomly. In the population each chromosome evaluated using fitness function and gives better score to the fittest as maximum.single point crossover was implemented in crossover operator. Single bit was chosen for mutation in mutation process. The researchers test the system by implementing different formulas for fitness function. They found that there are no false positive and the number of false negative decreases dramatically. GA engines an appealing tool in the search for intrusions in audit trail files. RenHui Gong et al.[9] chose GA approach to network misuse detection.they proposed genetic algorithm based ID approach contains two modules where each works in different stage. Training stage, GA used in an offline environment. In the ID stage, the generated rules are used to classify incoming network connections in the real-time environment. Their method gives good detection rates when using generated rules to classify the training data itself. They show that when the resulting rules were used to classify the testing dataset, the detection rates of network attacks were decreased by around 20%. Depending on the selection weight values of fitness function, the generated rules can be used to either generally detect network intrusions or precisely classify the types of intrusions. In this paper, we present a GA-based approach to network misuse detection. The rest of the paper is organized as follows. Section 3 provides a brief introduction to genetic algorithm. Section 4 describes applying genetic algorithm to intrusion detection and system architecture. In section 5 parameters of genetic algorithm and analysis of different fitness function formula are shown. Section 6 presents the conclusion and future work. 3. Genetic Algorithms John Holland in 1970s introduced familiar problem solving algorithms called Genetic Algorithms (GAs) which works on the principles of biological development, natural selection and genetic recombination [12]. In computer security applications, it is mainly used for finding optimal solutions to a specific problem. The process of a genetic algorithm usually begins with a randomly selected population of chromosomes. These chromosomes are representations of the problem to be solved. According to the attributes of the problem, different positions of each chromosome are encoded as bits, characters, or numbers. These positions are sometimes referred to as genes and are changed randomly within a range during evolution. GA iteratively evolves a population of initial individuals to a population of high quality individuals, where each individual represents a solution of the problem to be solved and is composed of a fixed number of genes. The number of possible values of each gene is called the cardinality of the gene. Figure 3.1 illustrates a general genetic algorithm flow [12].The operation starts from an initial population of randomly generated individuals. Then the population is evolved for a number of generations and the qualities of the individuals are gradually improved. An evaluation function is used to calculate the fitness of each chromosome. During each generation, three basic genetic operators are sequentially applied to each individual with certain probabilities, i.e., selection, crossover, and mutation. First, a number of best-fit individuals are selected based on a userdefined fitness function. The remaining individuals are discarded. Paper ID: SUB
3 of the above. There are some networks features have higher possibilities to be involved in network Classification rule. Table 4.1 shows the feature name, number of genes and their formats in first, second and third respective columns. Table 4.1: Selected Network Feature Feature Name Number of genes Format Source IP address 4 a.b.c.d Destination IP address 4 a.b.c.d Source Port Number 1 Int Destination Port Number 1 Int Duration 3 h:m:s State 1 Int Protocol 1 Int Number of Bytes Sent by Originator 1 Int Number of Bytes sent by Responder 1 Int Figure 3.1 Genetic Algorithm Flow Next, a number of individuals are selected and paired with each other. Each individual pair produces one offspring by partially exchanging their genes around one or more randomly selected crossing points. That is the selection of chromosomes for survival and combination is biased towards the fittest chromosomes [8]. At the end, a certain number of individuals are selected and the mutation operations are applied, i.e., a randomly selected gene of an individual abruptly changes its value. When a GA is used for problem-solving, three factors will have impact on the effectiveness of the algorithm[3], also the determination of these factors often depends on applications. They are: the selection of fitness function, the representation of individuals and the values of the GA parameters. 4. Intrusion Detection System using Genetic Algorithm 4.1Encoding Genetic algorithms can be used to evolve simple rules for traffic in networks. These rules are used to distinguish normal network connections against anomalous connections. These anomalous connections refer to events with probability of intrusions. The rules stored in the rule base are usually in the following syntax: If {condition} then {act} Here the condition usually refers to a match between current network connection and the rules in IDS, such as source and destination IP addresses and port numbers (used in TCP/IP network protocols), duration of the connection, protocol used, etc., indicating the probability of an intrusion. The features in the condition part are connected using logical AND operator. The act field usually refers to an action defined by the security policies within an organization, such as reporting an alert to the system administrator, stopping the connection, logging a message into system audit files, or all Different genes can be represented in different data types such as byte, integer, and float. This is necessary because of different formats and data ranges for different features, as shown in table 4.2. For example, the feature Duration has three components (hours, minutes, and seconds), each of which is represented by one gene of type byte. Similarly, each of the features Protocol, Source port, Destination port and Attack name is encoded using one gene of type integer, and each of the features Source IP and Destination IP has four components (a, b, c, and d), each of which is represented by one gene of type byte. 4.2Data Representation In order to fully exploit the suspicious level, we need to examine all fields related with a specific network connection. For simplicity, we only consider some obvious attributes for each connection. (d, 1, 0,b, -1, -1, -1, -1, 8, 2, 1, 2,b, -1, -1, -1, 4,2, 3, 3, 5, 0,0, 0, 8,0, 0, 0,0, 0, 0,4, 8, 2,1, 1, 2,0, 0, 0, 0, 0,0, 7, 3,2, 0, 0,0, 0, 0,0, 3, 8,8, 9, 1) Figure 4.2 Chromosome structure for example The definition of rules (for TCP/IP protocols) is shown in Table The corresponding rule for the Example Value attribute in Table 4.2 could be translated as: if {the connection has following information: source IP address ??.??; destination IP address: ?.??; source port number: 42335; destination port number: 80; connection time: 482 seconds; the connection is stopped by them originator; the protocol used is TCP; the originator sent 7320 bytes of data; and the responder sent bytes of data } then {stop the connection} Paper ID: SUB
4 Table 4.2: Rule definition for connection and range of values of each field Attribute Range of Example Descriptions Values Values ~25 A subnet with IP address Source IP d1.0b.**.** to address ( ??.??) Destination IP address Source Port Number Destination Port Number Duration ~ b*.** ( ? 255.??) 0~ ~ ~ State 1~20 11 Protocol 1~9 2 Number of Bytes Sent by Originator 0~ A subnet with IP address to Source port number of the connection Destination port number, indicates this is a http service Duration of the connection is 482 seconds The connection is terminated by the originator, for internal use The protocol for this connection is TCP The originator sends 7320 bytes of data In the example shown in Table 4.2, some wild cards (the * character and the? character) are used and the corresponding genes within the chromosome are shown as 1. These wild cards are used to represent an appropriate range of specific values. It is useful when representing a network block (a range of IP addresses or port numbers) in a rule. 4.3 System Architecture Figure 4.2: Architecture of applying GA into intrusion detection The network traffic used for GA is a pre-classified data set that differentiates normal network connections from anomalous behavior. First we have enough historical data which contains normal as well as anomalous network connections. This data set is gathered using network sniffers. It is used for the fitness evaluation during the execution of GA. By starting GA with only a small set of randomly generated rules, we can generate a larger data set that contains rules for IDS. These rules are good solutions for GA and can be used for filtering new network traffic.ga can evolve randomly selected population of rules, further with crossover and mutation operators. The fitness function is biased towards the rule that matches anomalous connection. When algorithm satisfied some predefined criteria of stopping, then rules are selected and added to IDS rule base. 5. Parameters in Genetic Algorithm There are many parameters like number of populations, number of generations, selection criteria, fitness function, crossover rate, mutation rate etc. to consider for the application of GA. Each of these parameters has heavily influences on the effectiveness of the genetic algorithm. These parameters should be adjusted according to the application environment of the system and the organization s security policy. Genetic Algorithm contains of a sequence of operations, which are: Selection, Crossover Mutation and sometimes Replacement, but the first operation is depending on the fitness value that obtained by Fitness Function. The main problem of GA is to find a suitable Fitness Function for a chromosome evaluation to get a solution for Intrusion Detection. So we concentrate on fitness function and analyses different fitness function formulae as follow: 1. Genetic Algorithm to identify the attack connection, the algorithm used different features in network connections to generate a classification rule set [2], they used the fitness function given by the formula, a b A B Paper ID: SUB F (1) where, A is total number of attack connections, a is number of attack connections the individual correctly classified, B is total number Normal connections in the population and b is number of normal connections a network correctly classified.the fitness function value would lie in the region [-1.1]. A positive fitness value will denote that the individual classifies more number of attacks correctly than it does the normal ones.to select the fit individuals, they have set a threshold value of Thus, all individuals that have a fitness value > 0.95 are selected to produce subsequent generations and are deemed fit.fitness Scale=[- 1,1]. 2. Genetic Algorithm used for Intrusion Detection System. The following steps are used to calculate the fitness function[8],as follow: Outcome= (i) =outcome suspicioulevel (ii) penalty=( *ranking)/100 (iii) fitness=1-penalty (iv) First, outcome is calculated based on whether field of connection matched the pre-classified data set & the multiply the weight of that field the value of matched is 0 or 1.Secondly, the absolute difference between the outcome of the chromosome and the actual suspicious level is then calculated. The suspicious level is a threshold that indicates the extent to which two network connections are considered a match. The actual value of suspicious level reflects observations from historical data. Third step, penalty value is computed if mismatch happens, the ranking in the equation indicates whether or not an intrusion is easy to identify.
5 Finally in fourth step the value of fitness value is computed. Fitness scale=[0,1]. population), so the value of A/Y must be subtracted from the function to give the penalty on the record. 3. Determination of the fitness of a rule[9], they use Support- Confidence Framework which identifies network intrusions or precisely classifies types of intrusion. Support = A and B / N Confidence= AandB / A Fitness=w1*support+w2 * confidence Here,N is the total number of network connections in the audit data, A stands for the number of network connections matching the condition A, A and B is the number of network connections that matches the rule if A then B.The weights w1 and w2 are used to control the balance between the two terms and have default values of w1=0.2 and w2=0.8.they set threshold value 0.Fitness scale=[0,1]. 4)Reward Penalty based fitness function presented[10].the basic idea behind it is that chromosomes vary in their strength and weakness. Hence fitness function must takes two points to consideration; first, the reward must be as more as the chromosome strength, and the penalty must be as more as the chromosome weakness. If c&a of selected record= c&a of compared record, then AB+1.Else if c of selected record= c of compared record but not a, then A+1.( c is condition and a is action) The reward-penalty fitness function is as the following: Fitness = Now, assume that the record with Best case, i.e. AB has highest value & A=0 this means that Fitness = 2, On other hand, the record with Worst case, i.e. A has highest value & AB=0 this means that Fitness = -2. But the fitness value provided by the fitness function must assign a non-negative cost to each candidate, so the constant value of 2 will be added to the function to get fitness value equal to 0 in the worst case and fitness value equal to 4 in the best case.fitness scale=[0,4]. Selection During each successive generation, a proportion of the existing population is selected to breed a new generation. Individual solutions are selected through a fitness-based process, where fitter solutions (as measured by a fitness function) are typically more likely to be selected. Two chromosomes are selected from the population to be parents to crossover. Crossover (Recombination): Crossover creates one or more new offspring from parent chromosomes to get better chromosomes. Table 7: Crossover example in binary format ( is the crossover point) Chromosome Chromosome Offspring Offspring Fitness = Where= the maximum value AB in the population= the maximum value A in the population. (AB/(AB+A)) will reflect the strength of the record (A/(AB+A)) will reflect the weakness of the record. We take strength minus weakness as in the function above. For example, as shown in table 6 as follow, Table 6: Example of record of fitness function Record A AB Fitness=((AB-A)/(AB+A)) Record Record AB/X: gives the rate which reflects the strength of the record depending on the most strongest record in the population.the resulted value= 0 in the worst case (if AB value = 0) and 1 in best case ( if the AB has highest value in the population), so it is logically should be added to the function to reward the record. A/Y: gives the rate which reflects the weakness of the record depending on the most weakness record in the population.the resulted value=0 in the best case (If A value =0) and 1 in the worst case (if the A has highest value in the Mutation Mutation changes randomly the new offspring. This is to prevent falling all solutions in population into a local optimum of solved problem. Table 8: Mutation example in binary format Original offspring Mutated offspring Conclusion Applying genetic algorithm to network intrusion detection techniques is presented.ga is used to derive a set of classification rules from network audit data. Some network features including both categorical and quantitative data fields were used when encoding and deriving the rules.ga used as an appealing tool in the search for intrusions in audit trail files. The main goal of GA is to create rules that match only the anomalous connections. These rules are tested on historical connections and are used to filter new connections to find suspicious network traffic. Also parameters and evolution processes for GA is presented. We suggest reward penalty based fitness function which evaluates population of chromosomes efficiently. This fitness function able to get good results in using GA for misused Paper ID: SUB
6 intrusion detection systems. If crossover rate is greater, then record with highest fitness value get selected more probably during selection step of GA and we can get better result. Future work includes generating a standard test data set for the genetic algorithm and applying it to a test environment. Detailed specification of parameters to consider for genetic algorithm should be determined during the experiments. Combining knowledge from different security sensors into a standard rule base is one field of research. Also additional work needed to experiment with use of different types of crossover and mutation. References [1] ChSatyaKeerthi N.V.L., Prasanna P.I., Priscilla B.M., Instuction Detection system Using Genetic Algorithm,Int. Journal of P2P Network rends and Technology, vol.1.no. 2.pp 1-7, [2] Goyal A., Kumar C., GA-NIDS: A Genetic Algorithm based Network Instruction Detection System, 2008 [3] Mohammad S. H., MukitMd.A.,BikasMd.A. N., An Implementation of Intrusion Detection System Using Genetic Algorithm, Int.Journal of Network Security and Its Applications, vol.4 no.2. pp , 2 [4] Jiang M., Munavar M., Reidemeister T., Ward P., Efficient Fault Detection and Diagnosis in Complex Software Systems with Information- Theoretic Monitoring IEEE Trans.On Dependable and Secure Computing.Issue 99, [5] Chittur A., Model Generation for an Intrusion Detection System Using Genetic Algorithms, [6] Lu W., Traore I., Detecting New Forms of Network Instruction Using Genetic Programming, Computational Intelligence, vol. 20, pp. 3, Blackwell Publishing, Malden, pp , [7] Pedro A. Diaz-Gomez and Dean F. Hougen Three Approaches to Intrusion Detection Analysis And Enhancements, National Computer And Information Security Conference Acis2006. [8] Li W. Using Genetic Algorithm for Network Intrusion Detection, Proceedings of the United States Department of Energy Cyber Security Group, [9] Gong R. H., Zulkernine M., Abolmaesumi P., A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection, [10] Alabsi,F., Naoum,R., "Fitness Function for Genetic Algorithm used in Intrusion Detection System",International Journal of Applied Science And Technology.Vol. 2.no 4, [11] Kandeeban,S.S., Rajesh R.S., A Mutual Construction For IDS Using GA, Int. Journal of Advance Science And Technology,vol.29, [12] Uppalaiah B., Anand K., Narsimha B., warajs., BharatT., Genetic Algorithm Approach to Intrusion Detection System, IJCST vol.3.1,2012. [13] Owais S.S.J., Kromer P., Snasel V., "Implementing GP onoptimizing Boolean and Extended Boolean Queries in IRs withrespectto Users Profiles", Proc. IEEE lcces'06 Egypt. pp [14] Owais S.,Kromer P.,Snasel V., "Query Optimization By Genetic algorithms, DATESO ISBN: ,pp ,2005. Paper ID: SUB
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi School of Computing Queen s University Kingston, Ontario,
USING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
Using Genetic Algorithm for Network Intrusion Detection
Using Genetic Algorithm for Network Intrusion Detection Wei Li Department of Computer Science and Engineering Mississippi State University, Mississippi State, MS 39762 Email: [email protected] Abstract
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Network Based Intrusion Detection System using Genetic Algorithm: A Study
Network Based Intrusion Detection System using Genetic Algorithm: A Study 1 Purushottam Patil, 2 Dr. Yogesh Sharma and 3 Dr. Manali Kshirsagar 1 Research Scholar (Computer Science & Engineering), Faculty
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic Mostaque Md. Morshedur Hassan Assistant Professor, Department of Computer Science and IT, Lalit Chandra Bharali College, Guwahati,
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
Denial-Of -Service Attack Detection Using KDD
Denial-Of -Service Attack Detection Using KDD Prof. Pankaj Salunkhe 1,Mayur Shishupal 2 1 Head of Department (Electronics & Telecommunication Engineering), YTIET, Bhivpuri [MH], India 2 Pursuing Master
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL Prof. Santosh T. Waghmode 1, Prof. Vinod S. Wadne 2 Department of Computer Engineering, 1, 2 JSPM s Imperial College of Engineering
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC
ABSTRACT CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC Mostaque Md. Morshedur Hassan LCB College, Maligaon, Guwahati, Assam, India. [email protected] Nowadays Intrusion
An Application of Machine Learning to Network Intrusion Detection
An Application of Machine Learning to Network Intrusion Detection Chris Sinclair Applied Research Laboratories The University of Texas at Austin sinclair@arlututexasedu Lyn Pierce epierce@arlututexasedu
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Improving Hypervisor-Based Intrusion Detection in IaaS Cloud for Securing Virtual Machines
Improving Hypervisor-Based Intrusion Detection in IaaS Cloud for Securing Virtual Machines 1 Shabnam Kazemi, 2 Vahe Aghazarian, 3 Alireza Hedayati 1 Department of Computer, Kish International Branch, Islamic
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013
Transistor Level Fault Finding in VLSI Circuits using Genetic Algorithm Lalit A. Patel, Sarman K. Hadia CSPIT, CHARUSAT, Changa., CSPIT, CHARUSAT, Changa Abstract This paper presents, genetic based algorithm
Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila
Data Mining For Intrusion Detection Systems Monique Wooten Professor Robila December 15, 2008 Wooten 2 ABSTRACT The paper discusses the use of data mining techniques applied to intrusion detection systems.
Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques
www.ijcsi.org 387 Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques Utkarsh Dixit 1, Shivali Gupta 2 and Om Pal 3 1 School of Computer Science, Centre
Alpha Cut based Novel Selection for Genetic Algorithm
Alpha Cut based Novel for Genetic Algorithm Rakesh Kumar Professor Girdhar Gopal Research Scholar Rajesh Kumar Assistant Professor ABSTRACT Genetic algorithm (GA) has several genetic operators that can
Programming Risk Assessment Models for Online Security Evaluation Systems
Programming Risk Assessment Models for Online Security Evaluation Systems Ajith Abraham 1, Crina Grosan 12, Vaclav Snasel 13 1 Machine Intelligence Research Labs, MIR Labs, http://www.mirlabs.org 2 Babes-Bolyai
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Virtual Host based Intrusion Detection System for Cloud
Virtual Host based Intrusion Detection System for Cloud Manthira Moorthy S #1, Rajeswari M #2 # Department of Computer Science and Engineering, Hindustan University P.O.Box No.1, Rajiv Gandhi Salai (OMR),
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs
Intrusion Detection Systems Oussama El-Rawas History and Concepts of IDSs Overview A brief description about the history of Intrusion Detection Systems An introduction to Intrusion Detection Systems including:
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
Intrusion Detections Systems
Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Introduction Characteristics of intrusion detection systems Some sample intrusion detection systems Page 1 Page
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?
Contents Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Motivation and basics (Why and what?) IDS types and principles Key Data Problems with
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
Evolutionary SAT Solver (ESS)
Ninth LACCEI Latin American and Caribbean Conference (LACCEI 2011), Engineering for a Smart Planet, Innovation, Information Technology and Computational Tools for Sustainable Development, August 3-5, 2011,
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
MULTI LAYERS INTERFERENCE DETECTION SYSTEM IN WEB BASED SERVICES
http:// MULTI LAYERS INTERFERENCE DETECTION SYSTEM IN WEB BASED SERVICES Jasti Hima Bindu 1, K. Satya Sandeep 2 1 Pursuing M.tech (IT), 2 Assistant professor, Nalanda Institute of Engineering & Technology,
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Use of Genetic Algorithm in Network Security
Use of Genetic Algorithm in Network Security L.M.R.J Lobo Professor, Department of Computer Science & Engg. Walchand Institute of Technology, Solapur, India Suhas B. Chavan MECSE (SEM IV), Department of
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
Intrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
A Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
IMPROVED OFF-LINE INTRUSION DETECTION USING A GENETIC ALGORITHM
IMPROVED OFF-LINE INTRUSION DETECTION USING A GENETIC ALGORITHM Pedro A. Diaz-Gomez Ingenieria de Sistemas, Universidad El Bosque Bogota, Colombia Email: [email protected] Dean F. Hougen Robotics, Evolution,
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
TEPZZ 96 A_T EP 2 961 111 A1 (19) (11) EP 2 961 111 A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.
(19) TEPZZ 96 A_T (11) EP 2 961 111 A1 (12) EUROPEAN PATENT APPLICATION published in accordance with Art. 13(4) EPC (43) Date of publication:.12.1 Bulletin 1/3 (21) Application number: 147426.7 (22) Date
Intrusion Detection Systems using Genetic Algorithms
King Saud University Computer Science Collage CSC590_Selected Topic A Literature Review on Intrusion Detection Systems using Genetic Algorithms Phase # 5 By: Lamees Alhazzaa ID: 426221091 Proposed to:
Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis
Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Comparison of Firewall and Intrusion Detection System
Comparison of Firewall and Intrusion Detection System Archana D wankhade 1 Dr P.N.Chatur 2 1 Assistant Professor,Information Technology Department, GCOE, Amravati, India. 2 Head and Professor in Computer
Detecting Anomaly IDS in Network using Bayesian Network
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. III (Jan. 2014), PP 01-07 Detecting Anomaly IDS in Network using Bayesian Network [1] Mrs.SumathyMuruganAsst.
Numerical Research on Distributed Genetic Algorithm with Redundant
Numerical Research on Distributed Genetic Algorithm with Redundant Binary Number 1 Sayori Seto, 2 Akinori Kanasugi 1,2 Graduate School of Engineering, Tokyo Denki University, Japan [email protected],
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Journal of Internet Banking and Commerce
Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, December 2009, vol. 14, no.3 (http://www.arraydev.com/commerce/jibc/)
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications
International Journal of Computer Science and Telecommunications [Volume 5, Issue 2, February 2014] 20 An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Data Mining Approach in Security Information and Event Management
Data Mining Approach in Security Information and Event Management Anita Rajendra Zope, Amarsinh Vidhate, and Naresh Harale Abstract This paper gives an overview of data mining field & security information
Denial-Of-Service Attack Detection Based On Multivariate Correlation Analysis and Triangle Area Map Generation
Denial-Of-Service Attack Detection Based On Multivariate Correlation Analysis and Triangle Area Map Generation Heena Salim Shaikh, Parag Ramesh Kadam, N Pratik Pramod Shinde, Prathamesh Ravindra Patil,
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
