Network Intrusion Detection System for Denial of Service Attack based on Misuse Detection



Similar documents
Taxonomy of Intrusion Detection System

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

CHAPTER 1 INTRODUCTION

IDS : Intrusion Detection System the Survey of Information Security

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

SURVEY OF INTRUSION DETECTION SYSTEM

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Network Based Intrusion Detection Using Honey pot Deception

Role of Anomaly IDS in Network

Intrusion Detection for Mobile Ad Hoc Networks

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Second-generation (GenII) honeypots

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Review on Network Intrusion Detection System Using Open Source Snort

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Wireless Network Security

Firewalls, Tunnels, and Network Intrusion Detection

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Closing Wireless Loopholes for PCI Compliance and Security

CS5008: Internet Computing

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

COSC 472 Network Security

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Performance Evaluation of Intrusion Detection Systems

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

An Inspection on Intrusion Detection and Prevention Mechanisms

IDS / IPS. James E. Thiel S.W.A.T.

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Wireless Intrusion Detection Systems (WIDS)

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

Radware s Behavioral Server Cracking Protection

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques

How To Protect A Network From Attack From A Hacker (Hbss)

Two State Intrusion Detection System Against DDos Attack in Wireless Network

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

CYBERTRON NETWORK SOLUTIONS

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Name. Description. Rationale

Wireless Security with Cyberoam

Technical Brief. Wireless Intrusion Protection

Firewalls and Intrusion Detection

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

Intrusion Detection Systems


Certified Ethical Hacker Exam Version Comparison. Version Comparison

A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

A Modular Approach for Intrusion Detection System in Wireless Networks

Security Awareness. Wireless Network Security

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

Keywords Attack model, DDoS, Host Scan, Port Scan

Introduction of Intrusion Detection Systems

THE ROLE OF IDS & ADS IN NETWORK SECURITY

SANS Top 20 Critical Controls for Effective Cyber Defense

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Host-based Intrusion Prevention System (HIPS)

Intrusion Detection System (IDS)

Comparison of Firewall and Intrusion Detection System

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Science Park Research Journal

Chap. 1: Introduction

Architecture Overview

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Security Issues In Cloud Computing and Countermeasures

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

On-Premises DDoS Mitigation for the Enterprise

Transcription:

www..org Intrusion Detection for Denial of Service Attack based on Misuse Detection 19 Munish Sharma 1 and Anuradha 2 1 Department of Electronics and Communication Engineering, Bhiwani Institute of Technology and Sciences Bhiwani, Haryana, India 127021 m.vashi@hotmail.com 2 Student M.Tech. Computer Science Engineering, DCRUST, Murthal Murthal, Haryana, India anu107sharma@gmail.com Abstract In a wireless network system the security is a main concern for a user. It is basically suffering from mainly two security attacks i) Virus Attack ii) Intruders. Intruder does not only mean it want to hack the private information over the network, it also includes using a node bandwidth and increasing the Delay of Service for other host over the network. This paper is basically based on such type of attack. This paper reviews the comparison of different Intrusion Detection. On the behalf of the reviewed work we proposed a new Intrusion that will mainly detects the most prominent attack of Wireless i.e. DoS Attack. The proposed system is an intelligent system that will detect the intrusion dynamically on the bases of Misuse Detection which has very less false negative. The system not only detects the intruders by the IP address, it detects the system with its contents also. Keywords: Intrusion, Intrusion Detection, Security, DdoS Attack. 1. Introduction Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Incidents have many causes, such as malware (e.g., worms, spyware), attackers gaining unauthorized access to systems from the Internet, and authorized users of systems who misuse their privileges or attempt to gain additional privileges for which they are not authorized. Although many incidents are malicious in nature, many others are not; for example, a person might mistype the address of a computer and accidentally attempt to connect to a different system without authorization.[1] 2. Reviewed Work 2.1 Wireless Attack 2.1.1 discovery attacks: Wireless LAN discovery tools such as Net-Stumbler are designed to identify various network characteristics. Although the use of these tools in not characterized as a real attack, it aims at discovering as much useful information about the network as possible. The derived information is used later on, for launching a real attack against the network. This technique is known as War driving. 2.1.2 Eavesdropping or Traffic analysis Eavesdropping and traffic analysis attacks allow the aggressor to monitor, capture data, and create statistical results from a wireless network. Since, not all IEEE 802.11 packet headers are encrypted and they travel through the network in clear text format, potential eavesdroppers can easily read them. 2.1.3 Masquerading or Impersonation attacks This category of attacks considers aggressors trying to steal and thereafter imitate the characteristics of a valid user or most importantly those of a legitimate Access Points (AP). The attacker would most likely trigger an eavesdropping or a network discovery attack to intercept the required characteristics from a user or an AP accordingly. Then, he can either change his Media Access Control address to that of the valid user or utilize software tools like the well-known Host AP that will enable him to act as a fully legitimate AP. This type of attack is also known as Rogue AP 2.1.4 Man-in-the-Middle attacks The most advanced type of attack on a wireless or wired network is the "Man-In-The-Middle" attack. The attacker attempts to insert himself as man in middle, between the user and an access point. The aggressor then proceeds to forward information between the user and access point, during which he collects log on information. As a result,

www..org 20 the attacker can maliciously intercept, modify, add, or even delete data. 2.1.5 Denial-of-Service attacks The main goal of Denial-of-Service (DoS) attacks is to inhibit or even worse prevent legitimate users from accessing network resources, services, and information. More specifically, this sort of attack targets the availability of the network i.e. by blocking network access, causing excessive delays, consuming valuable network resources, etc. A denial of service occurs when an attacker has engaged most of the resources a host or network has available, rendering it unavailable to legitimate users. More specifically, this sort of attack targets the availability of the network i.e. by blocking network access, causing excessive delays, consuming valuable network resources, etc. [3], [4] 2.2 Intrusion Detection Method Intrusion detection (ID) is the art of detecting inappropriate, incorrect, or anomalous activity. It also evaluates suspicious activity that occurs in corporate network. Intrusion detection system (IDS) is the process of detecting and identifying unauthorized or unusual activity on the system. Table 1: Difference among Firewall, Intrusion Detection and Intrusion Prevention Firewall It is the first defending line, which can prevent network efficiently. It has a deadly defect it only can prevent the intrusion from extranet. Intrusion Detection IDS is a process of identifying and responding to intrusion activities. It has ability of detecting illegal intrusion and attacks. Intrusion Prevention IPS combines the advantages of firewall and IDS. It not only detects the intrusion but it also can interdict these attacks. It can prevent the attacks which are missed by firewall or cannot be processed by IDS. 2.3 Classification of Intrusion Detection IDS can be categorized according to intruder type, detection behavior, and detection techniques. 2.3.1 Intruder Type IDS can be classified into external and internal according to intruder type. External Intruder Internal Intruder The external intruders are unauthorized users of the machines they attack. Figure 1: Classification of Intrusion Detection [5] Internal intruders have permission to access the system, but not some portions of it. Furthermore internal intruders divide into intruders who masquerade as another user, those with legitimate access to sensitive data and the most dangerous type, the clandestine intruders who have the power to turn off audit control for themselves.[4] 2.3.2 Detection Approaches IDS that monitor computer systems and networks, analyze them for signs of security policy violation, and respond accordingly, is based on one of these approaches: detection systems Misuse detection systems. Table 2: Comparison between Detection and Misuse Detection Detection Misuse Detection When the events of interest to an IDS define the undesirable behavior, or intrusions the system is said to be a misuse- based IDS. It uses Signature for attack detection. It has a low false positive rate. It cannot able to detect novel attacks or attacks for which no signature is available. Intrusion Detection Intruder type Detection Approaches Types Internal Intruders External Intruders Detection Misuse Detection When the event of interest to an IDS are expected or normal behaviors of monitored system, with intrusions defined as deviation of monitored behavior from this baseline, the system is said to be an anomaly-based IDS. It rely on identifying attack by detecting deviations from learned normal behavior. It has large number of false positive rate. N/w Host Hybrid

www..org 21 2.3.3 Types of Intrusion Detection There are three main different types of IDS. -based IDS Host-based IDS Hybrid IDS. This classification also depends on their Data Gathering Components (sensors), which they use to collect data to detect possible attacks against system. In the Host based approach every host has its own IDS and it collects data in the low level operations like network system calls (monitoring connection attempts to a port, etc.). HIDS monitor specific files, logs and registry settings on a single PC and can alert on any access, modifications, detection and copying of the monitored object. The role of HIDS is to flag any tampering with a specific PC and can automatically replace altered files when changed to ensure data integrity. A based IDS collects data in the network level, transparently to the other hosts. Their sensors are located somewhere in the network and monitor network traffic. The role of NIDS is to flag and sometimes to stop an attack before it gets information assets or causes damage. They capture network traffic and compare the traffic with a set of known attack pattern or signatures. NIDS devices compare these signatures every single packet that they see, in hopes of catching intruders in the act. Hybrid agents combine the functionality of host based agent with network based sensor technology that is limited to analyzing only the network traffic addressed to the specific host where the hybrid agent is installed. [5] 2.3.4 Different Intrusion Detection IDS NAME Table 3: Different IDS Implementation of Proactive Wireless Intrusion Detection Specification Intrusion Detection in WLANs A Probabilistic - Intrusion Detection Wireless Intrusion Detection Using a Lightweight IDR: Intrusion Detection Router for Defending against Distributed DoS Attack Distributed and Cooperative multi-agent based Intrusion Detection IDS Reference Name IDS1 IDS2 IDS3 IDS4 IDS5 IDS6 IDS1 IDS2 IDS3 IDS4 IDS5 IDS6 Type of IDS 3. DoS Attack Table 4: Difference between different IDS Attacks detected WEP Cracking MAC Spoofing War driving DoS Session Hijacking Masquerading Mitnick Attack DDoS Attack IP Spoofing Discovery Man In The Middle DoS Detection Mode Misuse Misuse + Misuse + Special Features Use SMS as alerting Combination of PSM and constraint imposed by security. Cooperative agent architecture Hybrid WIDS with lightweight agent DDoS Uses Bloom Filter Dos It has more than one agent which uses SVM classifier DDoS attacks have posed a powerful security threat to many ISPs, and brought enormous economic losses to them. The major steps of DDoS attacks are shown as follows. Firstly, attackers exploit the technology of client/server, and Establish a botnet by combining with multiple vulnerable computers. Secondly, attackers send commands to the botnet and launch the attack of Denial-of-Service (DoS) for one or several targets. The botnet will increasingly amplify the power of the DoS attack and make the target consume many system resources. Finally, the victims can not work normally. [6]

www..org 22 3.1 DoS Attack Detection Techniques Offline Detection Specific Detection DoS Detection Technique Detection Online Detection/Real Time Detection Figure 2: Classification of DoS Attack Detection Techniques 3.1.1 Offline Detection Offline detection mechanisms are classified into two groups: Specific detection based detection. Specific detection uses rule-match methods to justify whether monitored traffic have special attack features. The rule-match approaches maintaining per flow state and matching packets to a pre-defined set of rules has shown a certain good capability. However, rule-match approaches unlikely detect unknown DDoS attacks. -based detection models the behavior of normal traffic and then reports any anomalies. PCA, entropy and subspace methods have demonstrated accuracy and efficiency in detecting network-wide traffic behavior anomalies. However, most of these network-wide anomaly detection and machine-learning approaches are performed offline. Thus, it is difficult for them to take timely preventive measures for DDoS attacks. firewall for blocking. The firewall is responsible for the blocking of the packets. The proposed system can be used to attain information relating to network. It can be used to retrieve the information regarding the current systems in the network, the ports in use, locking the system etc. The system is first fed in with the currently available intruders and the kind of data that are to be kept out of network. Information once is stored into the system is used to check the data packets. The IP addresses that are registered are forwarded to the firewall once found among the packets. The case is different with the adaptive modal. The unwanted type of data that are stored in the adaptive modal database is compared with the data that is passing through the network. On finding any packet that contains any of the contents of the adaptive modal database they are registered as intruders and the information is stored in the database. The proposed system can be used to detect and block the man-in-middle attack. Man-In-The-Middle attack is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves intruding into a connection, intercepting messages, and selectively modifying data. Another intrusion attack that proposed system is going to handle is DoS attack. A denial-of-service (DoS) attack, is an attacker attempts to prevent unauthorized users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites etc. Data Flow 3.1.2 Online Detection Real-timely detect and defense DDoS attacks, on-line detection techniques are now paid wide attention. Generally, on-line detection techniques are statistical approaches regarding traffic feature and behaviors. Consequently, computation, memory consumption and detection time are key concerns about on-line detection. [6] Label data as normal or abnormal Matching Method Databas e 4. Proposed Work The proposed system is a Intrusion Detection that is an enhancement of the existing system. It is a system level program that works as the lower layer of the firewall. The system not only detects the intruders by the IP address, it detects the system with its contents also. The system checks the database for the already registered intruders. If found intruding, they are forwarded to the Blink Alarm if data is abnormal Figure 3: NIDS Architecture

www..org 23 Figure 1 gives the overview of proposed system that will capture the packets coming from network. Then compare it with the stored information if the capture data is match with stored information of intrusion, the intruder is detected and alarm blinks otherwise normal flow of data take place. Benefit of Proposed Work 1. User friendly 2. Ease of access 3. Fast retrievals 4. Single point system administration and maintenance 5. Added security to system 6. Can be implemented in any network 7. Easy to mention an IP address 5. Conclusion The proposed system will provide a secure and authenticated system to transfer data over the network. The proposed system will be defined for both the wireless or wired network. This system will provide the safer transmission in Denial of Service (DoS) Attack and Man- In-The-Middle (MITM) Attack which are mostly founds in networks. Beside this it will have single point system administration and maintenance which makes it user friendly. It will also add security to a system as well as networks. Through this proposed system it is easy to mention an IP address. 6. Future Work The purposed system can be used for the commercial proposed and it can implement as part of firewall system to combine the working of prevention and the detection system. The enhancement can be made to check the same approach for different other attacks over the network. The future work can be content oriented. References [1] Karen Scarfone Peter Mell Guide to Intrusion Detection and Prevention s (IDPS), NIST, 2007. [2] Jaydip Sen An - Intrusion Detection for Local Area s. in International Journal of Communication s and Information Security (IJCNIS) Vol. 2, 2010. [3] F Haddadi, M.A. Sarram, Wireless Intrusion Detection Using a Lightweight IEEE Second International Conference on Computer and Technology, pp.84-88, IEEE, 2010. [4] A.T., G. Kambourakis, S. Gritzalis Towards effective Wireless Intrusion Detection in IEEE 802.11i, IEEE Third International Workshop on Security, IEEE, 2007. [5] T. S. Sobh Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art, Computer Standards & Interfaces 28, pp. 670-694, Science Direct, 2006. [6] Yi Zhang, Qiang Liu, Guofeng Zhao A Real- Time DDoS Attack Detection and Prevention on per-ip Traffic Behavioral Analysis. pp.163-167, IEEE, 2010. [7] Scott Fowler, Sherali Zeadally Defending against Distributed Denial of ervice (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLSbased Wireless s., IEEE, 2006 [8] Lan Li and Gyungho Lee DDoS Attack Detection and Wavelets, pp.421-427, IEEE, 2003 [9] Wen-Chuan Hsieh, Chi-Chun Lo, Jing-Chi Lee, Li-T. Huang, The Implementation of a Proactive Wireless Intrusion Detection in the Fourth IEEE International Conference on Computer and Information Technology. CIT 04, pp. 581 586, IEEE, 2004. [10] H. Yang, L. Xie, J. Sun Intrusion Detection Solution to WLANs, IEEE 6th CAS Symp. on Emerging Technologies: Mobile and Wireless Comm. A. Shanghai, China, pp. 553-556, IEEE, 2004. [11] H. W. Chan1, K.M. Chan1, Vivien P. S. Chan1, IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks, 7th International Symposium on Parallel Architectures, Algorithms and s, IEEE 2004. [12] Wei Wang, Sylvani Gombault, Efficient Detection of DDoS Attack with Important Attributes, 3rd International Conference on Risks and Security of Internet and : CRiSIS 2008, IEEE, 2008. [13] Guanlin Chen, Hui Yao, Zebing Wang An Intelligent WLAN Intrusion Prevention on Signature Detection and Plan Recognition, 2010 Second International Conference on Future s, pp. 168-172, IEEE, 2010.