𝔖 Bobbio Scriptorium
✦   LIBER   ✦

A hybrid intrusion detection system design for computer network security

✍ Scribed by M. Ali Aydın; A. Halim Zaim; K. Gökhan Ceylan


Publisher
Elsevier Science
Year
2009
Tongue
English
Weight
629 KB
Volume
35
Category
Article
ISSN
0045-7906

No coin nor oath required. For personal study only.

✦ Synopsis


Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Intrusion detection systems can be misuse-detection or anomaly detection based. Misuse-detection based IDSs can only detect known attacks whereas anomaly detection based IDSs can also detect new attacks by using heuristic methods. In this paper we propose a hybrid IDS by combining the two approaches in one system. The hybrid IDS is obtained by combining packet header anomaly detection (PHAD) and network traffic anomaly detection (NETAD) which are anomaly-based IDSs with the misuse-based IDS Snort which is an open-source project.

The hybrid IDS obtained is evaluated using the MIT Lincoln Laboratories network traffic data (IDEVAL) as a testbed. Evaluation compares the number of attacks detected by misusebased IDS on its own, with the hybrid IDS obtained combining anomaly-based and misusebased IDSs and shows that the hybrid IDS is a more powerful system.


📜 SIMILAR VOLUMES


Design of multiple-level hybrid classifi
✍ Cheng Xiang; Png Chin Yong; Lim Swee Meng 📂 Article 📅 2008 🏛 Elsevier Science 🌐 English ⚖ 154 KB

With increasing connectivity between computers, the need to keep networks secure progressively becomes more vital. Intrusion detection systems (IDS) have become an essential component of computer security to supplement existing defenses. This paper proposes a multiple-level hybrid classifier, a nove

A distributed intrusion detection system
✍ Adrian P. Lauf; Richard A. Peters; William H. Robinson 📂 Article 📅 2010 🏛 Elsevier Science 🌐 English ⚖ 848 KB

This paper describes the design and implementation of a two-stage intrusion detection system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is provided by analyzing the context from the application-level interactions of networked nodes; each interaction corresponds

9436648 Development of computer aided de
✍ Fujii, A 📂 Article 📅 1995 🏛 Elsevier Science 🌐 English ⚖ 127 KB

consolidated control. Reported here is the experimental demonstration or certification for the theories of the range and rapidity which have been investigated beforehand. Relatively good agreements were proven.