Novel Approach for Hybrid Intrusion Detection System

Ravi Kishore Sharma, Mr. Gajendra Singh Chandel

Abstract


This Paper titled “Novel Approach for Intrusion Detection System” is an intrusion detection system (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Basically this paper is to develop host based cum network based intrusion detection system for Microsoft Windows XP environment. Proposed concept that had used in this was applying intrusion detection rule matching technique on the Security Log File and Event Log File in Microsoft Windows XP for the Host based IDS module. The intrusion had identified when there was finding of attacks that is creating with these two file in Microsoft Windows XP. In Network based IDS module DOS, U2R, Rejected (RST) attacks are finding during packet capturing in network. Moreover, the security and performance of the proposed IDS is also estimated. The proposed IDS approve the effectiveness of the proposed method, and it shows advantages of host based as well as network based security. The proposed model of hybrid IDSs offers several advantages over alternative systems. First of all it provided higher security, it supported high availability and scalability, and most important thing it produced good results in terms of normal and abnormal behaviors of arrived packet. The proposed model includes integration of individual components to produced batter results. It supports to a system/network administrator the privileges for finding the intrusions which is reliable, secure and fast. The proposed model of hybrid IDS implemented in short time and at a low cost. It also provides a best user interface.

Keywords


Intrusion Detection System, Security, Network, HOST, Packet, Data Base

References


Firkhan Ali Bin Hamid Ali and Yee Yong Len “Development of Host Based Intrusion Detection System for Log Files” IEEE symposium on business, engineering and industrial application(ISBEIA) langkawi, malaysia 2011

V. Jyothsna, V. V. Rama Prasad and K. Munivara Prasad “A Review of Anomaly based Intrusion Detection Systems” International Journal of Computer Applications (0975 – 8887)

Volume 28– No.7, August 2011

Asmaa Shaker Ashoor and Prof. Sharad Gore “ Importance of Intrusion Detection System (IDS)” International Journal of Scientific & Engineering Research, Volume 2, Issue 1, January-2011 1 ISSN 2229-5518.

Chung-Ming Ou and C.R. Ou “Immunity-inspired Host-based Intrusion Detection Systems” 2011 Fifth IEEE International Conference on Genetic and Evolutionary Computing.

Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi and Sukumar Nandi “A Host Based DES Approach for Detecting ARP Spoofing” IEEE Conferences 2011

Bin Zeng, Lu Yao, ZhiChen Chen “A Network Intrusion Detection System with the Snooping Agents” IEEE International Conference on Computer Application and System Modeling (ICCASM 2010) 2010.

LIN Ying, ZHANG Yan and OU Yang-Jia “ The Design and Implementation of Host-based Intrusion Detection System” Third IEEE International Symposium on Intelligent Information Technology and Security Informatics 2010

Anuradha and Anita Singhrova A Host Based Intrusion Detection System for DDoS Attack in WLAN IEEE International Conference on Computer & Communication Technology (ICCCT)-2011

T. S. Sobh “Wired and wireless intrusion detection system Classifications, good characteristics and state-of-the-art”, Computer Standards & Interfaces 28, pp. 670-694, Science Direct, 2006.

A. Lakhina, M. Crovella, & C. Diot, Mining Anomalies Using Traffic Feature Distributions. In proce. SIGCOM, Philadelphia,PA. 2005

C. Lui, T. Fu Chung, & T. Ch eung. Agent-based Network Intrusion System Using Data Mining Appr roaches. In Proceedings of the 3rd IEEE International Conference on Information Technology and Applications, Vol.1, pp131-136. 2005.

V. V. Phoha, The Springer Intern et Security Dictionary. Springer-Verlag. 2002.

C. Varun, B. Arindam, & K. Vipin, Anomaly Detection: A Survey, Department of Computer Science and Engineering, University of Minnesota. 2007.

A. El-Semary, J. Edmonds, J. Gonzales-Pino, & M. Papa, Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection. In Proceeding on Information Assurance United States Military Academy, West Point, NY. 2006.

Zulaiha Ali Othman, Entisar E. Eljadi Network Anomaly Detection Tools Based on Association Rules 2011 IEEE International Conference on Electrical Engineering and Informatics 17-19 July 2011, Bandung, Indonesia./

Asmaa Shaker Ashoor and Prof. Sharad Gore Importance of Intrusion Detection System (IDS) International Journal of Scientific & Engineering Research, Volume 2, Issue 1, January-2011 1 ISSN 2229-5518

V. Jyothsna, V. V. Rama Prasad and K. Munivara Prasad A Review of Anomaly based Intrusion Detection Systems International Journal of Computer Applications (0975 – 8887) Volume 28– No.7, August 2011

Vera Marinova-Boncheva A Short Survey of Intrusion Detection Systems 2007 [19] DOUGLAS J. BROWN, BILL SUCKOW, and TIANQIU WANG A Survey of Intrusion Detection Systems 2002


Full Text: PDF

Refbacks

  • There are currently no refbacks.




 


All Rights Reserved © 2012 IJARCSEE


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.