Research Article

Efficient Technique for Boosting Attack Detection Rate over a Host or Network System

by  Shashikant Sharma, Vineeta Soni, Nitesh Pradhan
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Issue 4
Published: Aug 2016
Authors: Shashikant Sharma, Vineeta Soni, Nitesh Pradhan
10.5120/ijca2016911026
PDF

Shashikant Sharma, Vineeta Soni, Nitesh Pradhan . Efficient Technique for Boosting Attack Detection Rate over a Host or Network System. International Journal of Computer Applications. 147, 4 (Aug 2016), 37-46. DOI=10.5120/ijca2016911026

                        @article{ 10.5120/ijca2016911026,
                        author  = { Shashikant Sharma,Vineeta Soni,Nitesh Pradhan },
                        title   = { Efficient Technique for Boosting Attack Detection Rate over a Host or Network System },
                        journal = { International Journal of Computer Applications },
                        year    = { 2016 },
                        volume  = { 147 },
                        number  = { 4 },
                        pages   = { 37-46 },
                        doi     = { 10.5120/ijca2016911026 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2016
                        %A Shashikant Sharma
                        %A Vineeta Soni
                        %A Nitesh Pradhan
                        %T Efficient Technique for Boosting Attack Detection Rate over a Host or Network System%T 
                        %J International Journal of Computer Applications
                        %V 147
                        %N 4
                        %P 37-46
                        %R 10.5120/ijca2016911026
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, with the growth of network technologies and its sizes the ratio of attacks has also increases. An attack is an event which has been designed with the aim to bypass the security parameters such as confidentiality, integrity, and/or availability of a standalone computer system or a network. Sometime attacks may cause of heavy loss for an individual, or an organization. To reduce an effect of attacks, it is good to detects at an early stage as it entered in a system or network. However, since the age of computer network number of researchers and industry communities has proposed a variety of exclusive attack detection algorithms in order to prevent information from such threats but each approach has its own problem in their performance. On the other hand most of the accessible techniques use signature base algorithm, detect only previously identified attack types, fails to detect the new attacks and produce huge false alarms so not be suitable for high pace networks. These issues severely restrict the utility of deterrence system. This paper has considered such issues and proposed a novel attack detection technique which generates low false alarms with enhancing the attack detection rate of known as well as anomaly attacks over the network.

References
  • Frank Kargl, Jörn Maier, Stefan Schlott, Michael Weber ―Protecting Web Servers from Distributed Denial of Service Attacks‖ ACM 1-58113-348-0/01/0005. May 1-5, 2001,
  • Anita K. Jones and Robert S. Sielken –“Computer System Intrusion Detection A Survey “International Journal of Computer Theory and Engineering, Vol.2, No.6, December, 2010.
  • Khaled Labib, V. Rao Vemuri ―Detecting and Visualizing Denial-of-Service and Network Probe Attacks Using Principal Component Analysis‖, 2006.
  • K. Kendall, A database of computer attacks for the evaluation of intrusion detection sytsems, Thesis, MIT, 1999.
  • Dorothy E. Denning, and P.G. Neumann “Requirement and model for IDES- A real-time intrusion detection system,” Computer Science Laboratory, SRI International, Menlo Park, CA 94025-3493, Technical Report # 83F83-01-00, 1985.
  • Barbarà, D., Couto, J., Jajodia, S., Popyack, L., and Wu, N., ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection, ACM SIGMOD Record, 30(4), 2001,pp. 15-24.
  • Wenke Lee and Salvatore J. Stolfo, ―A Framework for Constructing Features and Models for Intrusion Detection Systems‖, ACM Transactions on Information and System Security (TISSEC), Volume 3, Issue 4, November 2000.
  • Hamdan.O.Alanazi, Rafidah Md Noor, B.B Zaidan, A.A Zaidan “Intrusion Detection System: Overview” Journal Of Computing, Volume 2, Issue 2, February 2010, Issn 2151-9617
  • S. Peddabachigaria, A. Abrahamb, C. Grosanc and J. Thomas, "Modelling intrusion detection system using hybrid intelligent systems," Computer Applications, vol.30, 2007, pp.
  • Chi Ho Tsang, Sam Kwong, and Hanli Wang, “Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection.” Pattern Recognition, 40(9), 2007, pp. 2373–2391.
  • M. Saniee Abadeh, J. Habibi, and C. Lucas, “Intrusion detection using a fuzzy genetics-based learning algorithm.” Journal of Network and Computer Applications, 30(1), 2007, pp. 414–428.
  • Animesh Patcha and Jung-Min Park. An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks, 51(12):3448– 3470, 2007.
  • D.-H. Shin and S. Bagchi, “Optimal monitoring in multi-channel multi-radio wireless mesh networks,” in Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2009.
  • A. Hassanzadeh, R. Stoleru, and B. Shihada, “Energy efficient monitoring for intrusion detection in battery-powered wireless mesh networks,” in Proceedings of the 10th International Conference on Ad Hoc Networks and Wireless (ADHOC- NOW), 2011.
  • F. Hugelshofer, P. Smith, D. Hutchison, and N. J. Race, “OpenLIDS: a lightweight intrusion detection system for wireless mesh networks,” in Proceedings of the 15th Annual International Conference on Mobile Computing and Networking (MobiCom), 2009.
  • L. Portnoy, E. Eskin, and S. Stolfo, ―Intrusion Detection with Unlabeled Data Using Clustering,‖ Proc. ACM Workshop Data Mining Applied to Security (DMSA), 2001.
  • K. Burbeck & N.Y. Simmin, “Adaptive Real-Time Anomaly Detection with Incremental Clustering”, Information Security Technical Report, Vol. 12, No. 1, Pp. 56–67. 2007.
  • R. Fei, L. Hu & H. Liang, “Using Density-based Incremental Clustering for Anomaly Detection”, Proceedings of the 2008 International Conference on Computer Science and Software Engineering, Vol. 3, Pp. 986–989. 2008
  • J.H. Lee, S.G. Sohn, B.H. Chang & T.M. Chung, “PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-based Systems”, ETRI Journal, Vol. 31, No. 5, Pp. 554–564. 2009.
  • Mario Golling, Robert Koch, Rick Hofstede “Towards Multi-layered Intrusion Detection in High-Speed Networks” 2014 6th International Conference on Cyber Confl ict P.Brangetto, M.Maybaum, J.Stinissen (Eds.) 2014 © NATO CCD COE Publications, Tallinn
  • Archana I. Patil, Girish Kumar Patnaik, Ashish T. Bhole” Network Intrusion Detection using Layered Approach and Hidden Markov Model” International Journal of Computer Applications (0975 – 8887) Volume 93 – No.13, May 2014
  • Noureddine Assad, Brahim Elbhiri, Moulay Ahmed Faqihi, Mohamed Ouadou, and Driss Aboutajdine “Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks” Hindawi Publishing Corporation Journal of Computer Networks and Communications Volume 2015.
  • Marco Caselli, Emmanuele Zambon, Frank Kargl “Sequence-aware Intrusion Detection in Industrial Control Systems” CPSS’15, April 14, 2015, Singapore. ACM 978-1-4503-3448-8/15/04.
  • Minakshi Bisen & Amit Dubey “An Intrusion Detection System based on Support Vector Machine using Hierarchical Clustering and Genetic Algorithm” The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), Vol. 3, No. 1, January 2015.
  • Jabez J, Dr.B.Muthukumar “Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach” International Conference on Intelligent Computing, Communication & Convergence, Procedia Computer Science 48 ( 2015 ) 338 – 346, ELSEVIER
  • Ibrahim Goni, Ahmed Lawal “A Propose Neuro-Fuzzy-Genetic Intrusion Detection System” International Journal of Computer Applications (0975 – 8887) Volume 115 – No. 8, April 2015
  • Michel Toulouse, B`ui Quang Minh, Philip Curtis “A consensus based network intrusion detection System” arXiv:1505.05288v1 [cs.CR] 20 May 2015
  • James P.Anderson. ComputerSecurity Threat Monitoring and Surveillance,1980.Lastaccessed:Novmeber30,2008. http://csrc.nist.gov/publications/history/ande80.pdf
  • Prabhjeet Kaur, Amit Kumar Sharma, Sudesh Kumar Prajapat “ Madam ID for intrusion detection using data mining” IJRIM volume 2, issue 2, February 2012
  • Yogendra Kumar Jain and Upendra “An Efficient Intrusion Detection Based on Decision Tree Classifier Using Feature Reduction” International Journal of Scientific and Research Publications, Volume 2, Issue 1, January 2012.
  • G.V. Nadiammai, S.Krishnaveni, M. Hemalatha “ A Comprehensive Analysis and study in Intrusion Detection System using Data Mining Techniques” International Journal of Computer Applications (0975 – 8887) Volume 35– No.8, December 2011
  • R.Shanmugavadivu, Dr.N.Nagarajan “Learning of Intrusion Detector in Conceptual Approach of Fuzzy Towards Intrusion Methodology” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 5, May 2012
  • Amin Hassanzadeh, Radu Stoleru, Michalis Polychronakisy , Geoffrey Xie “RAPID: A Traffic-Agnostic Intrusion Detection for Resource-Constrained Wireless Mesh Networks” Technical Report 2014, Texas A& M University Copyright 2014 LENSS.
  • Dr. S.Vijayarani and Ms. Maria Sylviaa.S “Intrusion Detection System – A Study” International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
  • Ashish Negi, Himanshu Saini” An Overview of Intrusion Detection System in Computer Networks” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-4 Issue-7, December 2014
  • Uma Vishwakarma, Prof. Anurag Jain “Reduces Unwanted Attribute in Intruder File Based on Feature Selection and Feature Reduction Using ID3 Algorithm” Uma Vishwakarma et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1) , 2014, 896-900
  • Available from: http://nsl.cs.unb.ca/NSL-KDD/
  • Long-Sheng Chen, Jhih-Siang Syu “Feature Extraction Based Approach for Improving the Performance of Intrusion Detection System” Proceedings of the International MultiConference of Engineers and Computer Scientists 2015 Vol I, IMECS 2015, March 18 - 20, 2015, Hong Kong
  • http://www.cs.waikato.ac.nz/ml/weka/arff.html
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Intrusion Detection System Security Data Mining Feature Extraction.

Powered by PhDFocusTM