Mobile Security Agents for Network Traffic Analysis *
|
|
|
- Susan Reynolds
- 10 years ago
- Views:
Transcription
1 Mobile Security s for Network Traffic Analysis * Dipankar Dasgupta and Hal Brian Intelligent Security Systems Research Group Division of Computer Science The University of Memphis Memphis, TN [email protected] Abstract This paper describes the implementation of a distributed agent architecture for intrusion detection and response in networked computers. Unlike conventional intrusion detection systems (IDS), this security system attempts to emulate mechanisms of the natural immune system using Java-based mobile software agents. These security agents monitor multiple levels (packet, process, system, and user) of networked computers to determine correlation among the observed anomalous patterns, reporting such abnormal behavior to the network administrator and/or possibly taking some action to counter a suspected security violation. The paper focuses on the design aspects of such an intrusion detection system by integrating different artificial intelligence techniques and a mobile agent architecture. Specifically, IBM s Aglets TM Software Development Kit (ASDK) is used as the base agent architecture, along with Adaptive Resonance Theory (ART-2) neural networks for network pattern classification, and a fuzzy logic controller for decision/action resolution. The feasibility and implementation of the mobile security agent system is demonstrated and some preliminary results are reported. greatly from this model is considered a network intrusion and behavior closely matching the model is normal. In general, the normal behavior of a computing system can be characterized by observing its properties over time [12]. The problem of detecting anomalies (or intrusions) can be viewed as filtering non-permitted deviations of the characteristic properties in the monitored network system. This assumption is based on the fact that intruders activities in some way must be different from the normal users activities [11]. That assumption can lead to falsepositives when any new behavior is considered anomalous and causes detection failure when intrusive behavior closely matches normal behavior. Accordingly, one type of anomaly detection in use today is called Profile-Based Anomaly Detection (Figure 1), which focuses on characterizing the past behavior of individual users or related groups of users and then detecting significant deviations. A profile may consist of a set of parameters, so that deviation on just a single parameter may not be sufficient in itself to signal an alert. System Activity Key words: Intrusion Detection, Multi- System, ART, Decision Support System, Fuzzy Controller, and Mobile agents. 1. Introduction Activity Observed (Audit Log) Activity Expected (Profiles) Anomaly detection is performed by detecting changes in the patterns of utilization or behavior of the system. This type of intrusion detection is performed by building a statistical model that contains metrics derived from system operation and flagging as intrusive any observed metrics that have a significant statistical deviation from the model [2,5]. In other words, an intrusion detection system based on anomaly detection uses a model of normal network behavior to compare to currently observed network behavior. Any behavior that varies Compare and Respond Figure 1. Profile-based anomaly detection [1] The foundation of this approach is an analysis of audit records. The audit records provide input to the intrusion detection function in two ways. First, the designer must decide on a number of quantitative metrics that can be used to measure user behavior. An analysis of audit * The paper is accepted for publication by the IEEE Computer Society Press in the proceedings of DARPA Information Survivability Conference and Exposition II (DISCEX-II) to be held June 2001 in Anaheim, California.
2 records over a period of time can be used to determine the activity profile of the average user. Thus, the audit records serve to define typical behavior. Second, current audit records are the input used to detect intrusion. That is, the intrusion detection model analyzes incoming audit records to determine deviation from average behavior. The main advantage of the use of statistical profiles is that a prior knowledge of security flaws is not required. The detector program learns what is normal behavior and then looks for deviations. The approach is not based on system-dependent characteristics and vulnerabilities. Thus, it should be readily portable among a variety of systems [20]. Another method, called Parameter Pattern Matching (Figure 2), involves the use of day-to-day operational experience as the basis for detecting anomalies. One of the more attractive characteristics of this method is that the administrators are not specifically targeting security issues. This introduces a more robust environment in which anomalies and patterns might be detected and matched. Such pattern matching constitutes an especially powerful processing approach because it provides an intrusion detection capability for attacks that might not be predictable [1]. Target System (network,os, application, etc.) Normal Operation Operational View (Patterns) Intrusion Detection System Interpretations of Patterns (intrusion detection) Figure 2. Parameter pattern matching [1] This paper describes a mobile security agent architecture detecting coordinated and sophisticated attacks. The approach combines two anomaly detection methods by both profiling user behavior and also correlating it to network statistical behavior. The idea is that an intruder can be differentiated from a normal user by his activity and its associated impact on the system resources. This agent-based intrusion detection system (IDS) [11] attempts to emulate mechanisms of the natural immune system by detecting anomalies in a distributed manner. implemented on IBM s Aglets TM toolkit, which is composed of a set of Java-based mobile software agents that carry out specific tasks on the network and collaborate on the problem of network intrusion detection. A software agent can be defined as a software entity which functions continuously and autonomously in a particular environment and which is able to carry out activities in a flexible and intelligent manner that is responsive to changes in the environment. Helper User-Level Monitoring Graphical User Interface Decision/ Action Communicator Process-Level Monitoring System- Level Monitoring Killer Packet-Level Monitoring Figure 3. Mobile agent architecture Ideally, an agent that functions continuously would be able to learn from its experience, to communicate and cooperate with other agents, and to move from place to place in doing so [5,7]. The proposed immunity-based agents roam around the machines (nodes or routers) and monitor the situation in the network (i.e., look for changes such as malfunctions, faults, abnormalities, misuse, deviations, intrusions, etc., as shown in Figure 4). These agents can mutually recognize each other's activities and can take appropriate actions according to the underlying security policies. Such an agent can learn and adapt to its environment dynamically and can detect both known and unknown intrusions [11]. 2. Mobile Security Architecture The immunity-based IDS, named SANTA (Security s for Network Traffic Analysis) currently Figure 4. Different roaming security agents
3 This immunity-based IDS involves the collaboration of multiple autonomous software agents that detect deviations in the normal behavior of networked computers. Some agents monitor several parameters at multiple levels (packet, process, system, and user levels) to determine the correlation among the observed parameters during intrusive activities. Other agents wait for security violations to occur and then make a decision as to whether or not an action should be taken against the offending user or process. Accordingly, there are also some single-purpose agents that perform tasks such as communicating messages, reporting the status of the network, and/or killing processes. The roles and functionalities of the different types of agents are described below Monitoring s These agents monitor networked computers by executing UNIX tools such as snoop, ps, and mpstat, looking for deviations in the learned normal behavior. For each network host, there is an associated monitoring agent for each of the four levels: packet level, process level, system level, and user level. At the packet level, an agent detects changes in the numbers and sizes of packets for different protocols. At the process level, a different agent detects unusual process memory allocation, priority, CPU usage, etc. At the system level, an agent looks at overall system memory, CPU, and I/O usage. At the user level, an agent scans the UNIX syslog file for login failures, attempts to gain root access, etc. All of these agents report anomalous behavior to a Decision/Action (D/A ) for further processing. Figure 5 illustrates the process that Monitoring s follow to learn the behavior of monitored parameters using ART Neural Networks (NN). Start Execute UNIX commands Read output; Make pattern ART-2 NN Classifier New category Send signals to D/A Old category or still learning 2.2. Communicator s These agents pass messages between agents. The Aglets Software includes these Messenger s as a primary feature Decision/Action s These agents make decisions as to whether an action should be taken on behalf of the system administrator based on the information from the Monitoring s. Each of them has a fuzzy logic controller component in order to determine the severity of the anomaly and the age of such previous incidents to determine whether the D/A further activates one or more Response s-- Helper s and Killer s (Figure 6). Start 2.4. Helper s These agents provide status information to the system administrator s Graphical User Interface (GUI). They are activated by the Decision/Action when a warning is received from the Monitoring s or when a Killer has been dispatched Killer s Wait for D/A signal Warning Fuzzy Take action Controller Take no action Dispatch Helper No warning Dispatch Killer s Figure 6. Decision/action agent process These agents terminate processes (using the UNIX kill 9 process id command) that are responsible for intrusive behavior on the network. The Decision/Action dispatches a Killer when the Threat Level determined by its Fuzzy Logic Controller is Medium- High or High. Once the process is terminated, the Killer reports the action to the GUI using a Helper (Figure 6). Figure 5. Monitoring agent process
4 Start Display GUI Decision/Action s Monitoring s Dispatch s Wait for Messages Messages Wait for Warnings Warnings Get Network Statistics Patterns Update GUI Make Decisions Classify Patterns Actions Anomalies Send Messages to GUI Send Warning to D/A Figure 7. Overall line diagram showing different processes of SANTA The overall sequence of steps of SANTA is shown in Figure 7. Once the agents are dispatched to the desired host on the network, the Graphical User Interface (Figure 13) waits for messages from the agents to update its display. The Decision/Action s wait for warning signals from the Monitoring s and make decisions based on the information regarding violations. Any actions are relayed to the GUI for display. The Monitoring s begin immediately sensing network status and classifying them into distinct categories using the ART neural network. After the training is completed, these agents report patterns that do not fit into known categories as anomalies to the Decision/Action. Aglet is launched using the Create button and selecting the appropriate Java class. The main administrator GUI 3. Implementation Details The IBM Aglets TM Software Development Kit (ASDK version 1.0.3) was selected for the agent-programming environment due to its ease of use, and associated rapid development time of agents. The software was downloaded from IBM s Tokyo Research Laboratory website ( Java 1.1 was required for this implementation for compatibility reasons. After installing Java and Aglets on a UNIX server, the Tahiti Aglet User Interface was launched to host the mobile agents. Two instances of Tahiti were used to simulate more than one server on the network with different port numbers distinguishing the two Aglet Server addresses (Figure 8). The first Tahiti interface in Figure 8 shows that the server called test, port 434, is hosting the main SANTA Aglet named Santa.Santa. It contains the GUI and related message sending and receiving methods. Initially, this Figure 8. Tahiti Aglet User Interface immediately appears (as shown in Figure 13) and the user selects a host computer for the Decision/Action and Monitoring s. The Aglets are then dispatched by the user to initiate the intrusion detection process. The
5 second Tahiti interface in Figure 8 displays the Decision/Action and all four Monitoring s residing on the Aglet Server called test, port 455. Security properties must also be specified in Tahiti to allow read access for any audit logs or data files and execute access for any UNIX commands [4]. Mobile agents dispatched from other Tahiti interfaces are considered untrusted for security purposes. 3.1 Decision support components Some Monitoring s store network, system, or user behavior patterns to serve as a knowledge base or model of known normal behavior. When learning of normal behavior has ceased, the agent compares current network, system, or user behavior with its knowledge base of normal patterns. Any patterns that do not closely match previously seen patterns are considered anomalous and are reported to other agents for possible action against the user or process. Network Pattern F 1 w ij w ji F 2 Winning category bottom-up adaptive filter. This filter is contained in pathways leading from a feature representation field (F1) to a category representation field (F2) whose nodes undergo cooperative and competitive interactions. In an ART network there is a second, top-down adaptive filter that leads to the crucial property of code self-stabilization. Such top-down adaptive signals play the role of learned expectations in an ART system. They enable the network to carry out attentional priming, pattern matching, and self-adjusting parallel search [15]. In order to cope with arbitrary sequences of analog input patterns, ART-2 architectures embody solutions to a number of design principles, such as stability-plasticity tradeoff, the search-direct access tradeoff, and the matchreset tradeoff. A parallel search scheme updates itself adaptively as the learning process unfolds, and realizes a form of real-time hypothesis discovery, testing, learning, and recognition. After learning self-stabilizes, the search process is automatically disengaged. Thereafter input patterns directly access their recognition codes without any search. Thus, recognition time for familiar inputs does not increase with the complexity of the learned code. A novel input pattern can directly access a category if it shares invariant properties with the set of familiar exemplars of that category. The architecture s global design enables it to learn effectively despite the high degree of nonlinearity of such mechanisms [8]. x 9 1 ART-2 2 Figure 9. ART-2 Neural Network 3 Normal Patterns ART-2 Neural Network Classifier. The Adaptive Resonance Theory (ART) neural network classifier (developed by Grossberg [8,15]) was chosen due to its ability to group presented patterns into categories without human supervision. ART is one type of an unsupervised neural network that uses competitive learning (Figure 9). A pattern that does not closely match any of the known categories either causes the network to add a new category during the learning phase (Figure 10) or identifies the pattern as anomalous during the testing phase (Figure 11). ART-2 networks self-organize stable recognition categories in response to arbitrary sequences of analog (gray-scale, continuous-valued) input patterns. ART networks encode new input patterns, in part, by changing the weights, or long-term memory (LTM) traces, of a Figure 10. ART-2 categories created in ten-dimensional hyperspace x Figure 11. Abnormal patterns falling outside known normal behavior categories x 10 Abnormal Patterns x 10
6 Fuzzy Controller. A fuzzy controller [21] was developed for the Decision/Action s that must make decisions and possibly take action based on anomalous behavior. These agents receive reports of security incidents, including the severity of the event, from the Monitoring s and the cumulative totals are adjusted for age. Together, these incident characteristics are fed to a fuzzy controller, and a decision is made to take some action, such as terminate a process, or do nothing, based on the controller output. There were five fuzzy sets created representing Low, Low-Medium, Medium, Medium-High, and High threat levels (Figure 12(a)). 5^4 or 625 fuzzy rules were defined to govern the controller s decisions. For example, one such rule was if System Threat is Low and User Threat is Low and Process Threat is Low and Packet Threat is Low, then Threat Level is Low. Based on the inputs from these four monitored levels of the network, the degree of membership to each set was calculated, and the union of the five resulting fuzzy sets was determined (Figure 12(b)) using the 2^4 or 16 active fuzzy rules. A defuzzification method was applied to the set union to find the center of gravity of the set, yielding the actual Threat Value. If this value exceeded the Threat Threshold (>0.5, Medium-High or High), the controller dispatched an agent to kill the associated process, if one existed, or warned the network administrator of a high threat level. Otherwise, the controller took no action. Figures 12(a) and 12(b) show the membership functions used to implement the Fuzzy Controller. a. b. 0 0 low low Threat Levels low-medium medium-high Medium high 0.3 low-medium.5 medium.5 medium-high high Figure 12. a. Five Fuzzy Sets, b. Union of Sets 4. Experimentation Experiments were conducted in the network security lab to test SANTA s ability to learn normal network behavior and detect anomalous behavior. The initial results were very promising with successful classification of network patterns during the learning phase and detection of known anomalies and intentional violations during the testing phase (shown in Figure 13). Factors determining SANTA s sensitivity to anomalies were the length of training time (learning phase) of Monitoring s, ART-2 thresholds, and the age function of the fuzzy controller. These parameters were repeatedly adjusted until a stable combination was found. Table 1 shows the rate at which the Monitoring s created categories of network patterns under average server load assuming that all network behavior was normal. Ten trials were performed for each agent using a fixed pattern ratio. For example, the System-Level Monitoring read 500 patterns resulting in seven ART-2 categories. The agent then classified another 500 patterns into six old categories during the testing phase. Five patterns, representing the false-positives, did not fit into any of the original seven categories. Training time was restricted to short intervals during system development and then later increased incrementally during system testing. The longer the agents trained, the more patterns were stored in the ART- 2 network, and the greater the sensitivity to true anomalies while false-positives were decreased (Table 2). ART-2 thresholds determined the size of the ART categories and ultimately, the sensitivity to small differences in network patterns. Higher thresholds meant more refined categories and more precise detection of anomalies. The disadvantage, though, was an increase in the number of categories and false-positives. Since the agent s memory was limited, too high a threshold caused the agent to run out of available categories before all normal behavior was learned. On the other hand, too small a threshold lead to broad categories and detection failure (false-negatives), while using very few of the available categories. The threshold used for all three agents during actual implementation was 0.99, forcing highly precise categorization of network behavior patterns and limiting false-negatives. The age function in the fuzzy controller determined the rate at which the threat levels of previous incidents were degraded over time. Faster degradation limited the correlation of current incidents to others occurring at about the same time while slow degradation allowed correlation of events occurring over a wider period of time. The function used in SANTA degraded the threat levels at 0.01 per second, ensuring total degradation after 100 seconds.
7 Figure 13. SANTA s Graphical User Interface Trial # System-Level Monitoring (500/500 Pattern Ratio) Table 1. Normal Network Behavior using ART-2 Classifiers Process-Level Monitoring (15000/15000 Pattern Ratio) Packet-Level Monitoring (50/50 Pattern Ratio) Average
8 Table 2. Effect of Pattern Ratio on and Pattern Ratio System-Level Monitoring Process-Level Monitoring Packet-Level Monitoring Pattern Ratio Pattern Ratio 250/ / / / / / / / / / / / Conclusion When a hacker attacks a system, the ideal response would be to stop his activity before he can cause any damage or gain access to any sensitive information. This would require recognition of the attack as it takes place. Different models of intrusion detection have been developed [14,18], and much IDS software is available for use. Commercial IDS products such as NetRanger, RealSecure, and Omniguard Intruder Alert work on attack signatures. These signatures needed to be updated by the vendors on a regular basis in order to protect from new types of attacks. However, no detection system can catch all types of intrusions and each model has its strengths and weaknesses in detecting different violations in networked computer systems. Recently, researchers started investigating techniques like artificial intelligence [9,13,16], autonomous agents [5,6,10] and mobile agent architectures [3,17] for detecting intrusion in network environment. Most existing intrusion detection systems either use packet-level information or user activities to make decisions on intrusive activities [12,19]. In this paper, an agent-based intrusion detection system (SANTA) is described that can simultaneously monitor network activities at different levels (such as packet level, process level, system level, and user level). This SANTA system represents a novel approach to distributed intrusion detection. The system emulates some mechanisms of the human immunity system and features distributed identification of anomalies and decentralized control of decisions and responses to those anomalies. The IBM Aglets agent software provides a suitable environment for hosting the mobile autonomous agents that comprise this intrusion detection system. s can move throughout the network observing network behavior patterns and communicating any anomalies to other agents for action. The ART-2 neural network classifier is an ideal learning mechanism for Monitoring s. Observed network patterns can be classified into categories during a learning phase without loss or degradation to previously created categories. Patterns that fail to fit into known categories during the testing phase are assumed to be anomalous. A fuzzy controller takes all anomaly reports as input and determines the current Threat Level. If the threat is Medium-High or High, the Decision/Action will take action to terminate the associated process. Though the long-term plan of this project is to develop immunitybased mobile agent architecture from design principles, the use of IBM s Aglets TM in our current implementation is a proof-of-concept for immunity-based intrusion detection system framework [11]. 6. References [1] Amoroso, E., Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response, Intrusion.Net Books, Sparta, New Jersey, [2] Allen, J. et al., State of the Practice of Intrusion Detection Technologies, Technical Report (No. CMU/SEI-99-TR-028), January [3] Asaka, M., S. Okazawa, A. Taguchi, and S. Goto, A Method of Tracing Intruders by Use of Mobile s, INET'99, June [4] Axelsson, S., U. Lindqvist, U. Gustafson, and E. Jonsson, An Approach to UNIX Security Logging, Technical Report, IEEE Network, [5] Balasubramaniyan, J., J. Fernandez, D. Isacoff, E. Spafford, and D. Zamboni. An Architecture for Intrusion Detection Using Autonomous s, COAST Technical Report 98/5, Purdue University, [6] Barrus, J. and N. Rowe, A Distributed Autonomous- Network-Intrusion Detection and Response System, Proceedings of the Command and Control Research and Technology Symposium, Monterey, CA, June [7] Berenji, H. and D. Vengerov,, Cooperation, and Coordination in Multi- Systems, Technical Report, IIS , [8] Carpenter, G. and S. Grossberg, ART 2: Self-organization of Stable Category Recognition Codes for Analog Input Patterns, Applied Optics, Vol. 26, No. 23, December 1987.
9 [9] Carver, C., J. Hill, J. Surdu, and U. Pooch, A Methodology for Using Intelligent s to Provide Automated Intrusion Response, IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, June [10] Crosbie, M. and E. Spafford, Defending a Computer System using Autonomous s, Proceedings of the 18 th National Information Systems Security Conference, October [11] Dasgupta, D., Immunity-Based Intrusion Detection Systems: A General Framework, Proceedings of the 22 nd National Information Systems Security Conference (NISSC), October 18-21, [12] Debar, H., M. Dacier, and A. Wepspi, A Revised Taxonomy for Intrusion Detection Systems, Technical Report, Computer Science/Mathematics, [13] Frank, J., Artificial Intelligence and Intrusion Detection: Current and Future Directions, Proceedings of the 17 th National Computer Security Conference, October [14] Frincke, D., Balancing Cooperation and Risk in Intrusion Detection, ACM Transaction on Information and System Security, Vol. 3, No. 1, February [15] Grossberg, S., ed., Neural Networks and Natural Intelligence, MIT Press, Cambridge, Massachusetts, [16] Helmer, G., J. Wong, V. Honavar, and L. Miller, Intelligent s for Intrusion Detection, Proceedings, IEEE Information Technology Conference, pages , Syracuse, NY, September [17] Jansen, W., P. Mell, T. Karygiannis, and D. Marks, Mobile s in Intrusion Detection and Response, Proceedings of the 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, June [18] Lane, T. and C.E. Brodley, Temporal Sequence and Data Reduction for Anomaly Detection, ACM Transaction on Information and System Security, Vol. 2, No. 3, August [19] Mukherjee, B., L.T. Heberline, and K. Levit, Network Intrusion Detection, IEEE Network, [20] Stallings, W., Network Security Essentials: Applications and Standards, Prentice Hall, Upper Saddle River, New Jersey, [21] Zadeh, L., Fuzzy Logic, Neural Networks and Soft Computing, Communications of the ACM, Vol. 37, No. 3, pp , Acknowledgements The authors would like to thank the University of Memphis Intelligent Security Systems Research Laboratory members for their useful comments and suggestions, and especially Dan Lebowitz for providing vital technical assistance. This work is partly funded by the Defense Advanced Research Projects Agency (DARPA) under the contract no. F
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent Chintan Bhatt 1, Asha Koshti 2,Hemant Agrawal 3, Zakiya Malek 4, Dr Bhushan Trivedi 5 MCA Dept.,GLS Institute of Computer
Immunity-Based Intrusion Detection System: A General Framework
Immunity-Based Intrusion Detection System: A General Framework Dipankar Dasgupta Division of Computer Science Mathematical Sciences Department The University of Memphis Memphis, TN 38152 Phone (901) 678-4147
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs
Intrusion Detection Systems Oussama El-Rawas History and Concepts of IDSs Overview A brief description about the history of Intrusion Detection Systems An introduction to Intrusion Detection Systems including:
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
INTRUSION DETECTION SYSTEM USING SELF ORGANIZING MAP
Acta Electrotechnica et Informatica No. 1, Vol. 6, 2006 1 INTRUSION DETECTION SYSTEM USING SELF ORGANIZING MAP Liberios VOKOROKOS, Anton BALÁŽ, Martin CHOVANEC Technical University of Košice, Faculty of
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi School of Computing Queen s University Kingston, Ontario,
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Introduction Characteristics of intrusion detection systems Some sample intrusion detection systems Page 1 Page
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
How To Create A System Security System That Can Detect An Anomaly In A System From A Log On A Network On A Computer System
Intrusion Detection Systems and A View To Its Forensic Applications The University of Melbourne Department of Computer Science Parkville 3052, Australia ABSTRACT Traditional computer security has often
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
Bio-inspired mechanisms for efficient and adaptive network security
Bio-inspired mechanisms for efficient and adaptive network security Falko Dressler Computer Networks and Communication Systems University of Erlangen-Nuremberg, Germany [email protected]
Neural Networks for Intrusion Detection and Its Applications
, July 3-5, 2013, London, U.K. Neural Networks for Intrusion Detection and Its Applications E.Kesavulu Reddy, Member IAENG Abstract: With rapid expansion of computer networks during the past decade, security
Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques
www.ijcsi.org 387 Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques Utkarsh Dixit 1, Shivali Gupta 2 and Om Pal 3 1 School of Computer Science, Centre
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Journal of Internet Banking and Commerce
Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, December 2009, vol. 14, no.3 (http://www.arraydev.com/commerce/jibc/)
Network Security Using Job Oriented Architecture (SUJOA)
www.ijcsi.org 222 Network Security Using Job Oriented Architecture (SUJOA) Tariq Ahamad 1, Abdullah Aljumah 2 College Of Computer Engineering & Sciences Salman Bin Abdulaziz University, KSA ABSTRACT In
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
A Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
USING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis
Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks Oleg Kachirski School of Computer Science University of Central Florida Orlando, FL, U.S.A. [email protected] Ratan Guha School
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network
Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Intrusion Detection & SNORT. Fakrul Alam [email protected]
Intrusion Detection & SNORT Fakrul Alam [email protected] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not up to date 0- days get through
Artificial Neural Networks for Misuse Detection
Artificial Neural Networks for Misuse Detection James Cannady School of Computer and Information Sciences Nova Southeastern University Fort Lauderdale, FL 33314 [email protected] Abstract Misuse detection
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
How to Detect and Prevent Cyber Attacks
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Clavister InSight TM. Protecting Values
Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide
Network packet payload analysis for intrusion detection
Network packet payload analysis for intrusion detection Sasa Mrdovic Abstract This paper explores possibility of detecting intrusions into computer networks using network packet payload analysis. Quick
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
Intrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
A very short history of networking
A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
On A Network Forensics Model For Information Security
On A Network Forensics Model For Information Security Ren Wei School of Information, Zhongnan University of Economics and Law, Wuhan, 430064 [email protected] Abstract: The employment of a patchwork
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
Data collection mechanisms for intrusion detection systems
Data collection mechanisms for intrusion detection systems Eugene Spafford Diego Zamboni Center for Education and Research in Information Assurance and Security 1315 Recitation Building Purdue University
Bio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?
Contents Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Motivation and basics (Why and what?) IDS types and principles Key Data Problems with
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall,
Science Park Research Journal
2321-8045 Science Park Research Journal Original Article th INTRUSION DETECTION SYSTEM An Approach for Finding Attacks Ashutosh Kumar and Mayank Kumar Mittra ABSTRACT Traditionally firewalls are used to
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
