CFP last date
20 May 2024
Reseach Article

Integrity Model based Intrusion Detection System: A Practical Approach

by Qamar Rayees Khan, Muheet Ahmed Butt, Mohammad Asger, Majid Zaman
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 10
Year of Publication: 2015
Authors: Qamar Rayees Khan, Muheet Ahmed Butt, Mohammad Asger, Majid Zaman
10.5120/20186-2407

Qamar Rayees Khan, Muheet Ahmed Butt, Mohammad Asger, Majid Zaman . Integrity Model based Intrusion Detection System: A Practical Approach. International Journal of Computer Applications. 115, 10 ( April 2015), 9-12. DOI=10.5120/20186-2407

@article{ 10.5120/20186-2407,
author = { Qamar Rayees Khan, Muheet Ahmed Butt, Mohammad Asger, Majid Zaman },
title = { Integrity Model based Intrusion Detection System: A Practical Approach },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 10 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 9-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number10/20186-2407/ },
doi = { 10.5120/20186-2407 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:54:26.867885+05:30
%A Qamar Rayees Khan
%A Muheet Ahmed Butt
%A Mohammad Asger
%A Majid Zaman
%T Integrity Model based Intrusion Detection System: A Practical Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 10
%P 9-12
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information is considered to be an asset for any organizations. Malicious attacks/threats can compromise the security and trust of a system, which shall be controlled by introducing Intrusion Detection System. In order to offer maximum security for the confidential data and the corresponding data integrity, a novel Integrity model based Intrusion Detection system is proposed. Hence, the optimum Integrity is increased by increasing the intrinsic attributes of Information System like accuracy, consistency and reliability. The proposed research paper tries to propose a model for improving the optimum information Integrity by quantifying the intrinsic integrity attributes so that the data may not get compromised.

References
  1. Anderson, J. M. (2003). "Why We Need a New Definition of Information Security," Computers & Security (22)4, p. 308-313.
  2. Carol J Fung, Jie Zhang. (1973). "Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks", In Proceeding of IEEE Transactions on Network and Service Management, Vol. 9, No. 3,pp. 320-332, September 2012.
  3. D. E. Bell and L. J. LaPadula(1973). Secure computer systems: Mathematical foundations. Technical Report MTR-2547, Vol. 1, MITRE Corp. , Bedford, MA, 1973.
  4. Francisco Maciá-Pérez, J. Mora-Gimeno,(2011). "Network Intrusion Detection System Embeddedon a Smart Sensor", In Proceeding of IEEE Transactions on Industrial Electronics, Vol. 58, No. 3,p. 722-732, Mar 2011.
  5. FenyeBao, Ing-Ray Chen, MoonJeong Chang, and Jin-Hee Cho,(2012). "Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection", In Proceeding of IEEE Transactions on Network and Service Management, Vol. 9, No. 2, p. 169-183, June 2012.
  6. K. D. Loch, H. H. Carr, M. E. Warkentin, Threats to information systems: today's reality, yesterday's understanding, MIS Quarterly 16 (2), 1992, pp. 173–186
  7. KapilWankhade, SadiaPatka,(2010). "An Efficient Approach for Intrusion Detection Using Data Mining Methods", in International Conference on Information Retrival& Knowledge Management, p. . 200-103, Mar 2010.
  8. Khan, Q. R, Butt,M, Zaman, M, Asger, M,(2013). "A Novel Approach Based Information Integrity Modeling", Inter. Jour. of Engineering Science and Innovative Technology (IJESIT) , Volume 2, Issue 1, January 2013 ,p. 210-215.
  9. J. LaPadula and D. E. Bell. , (1996). Secure computer systems: A mathematical model. Technical Report MTR-2547, Vol. 2, MITRE Corp. , Bedford, MA, 1973. Reprinted in J. of Computer Security, vol. 4, no. 2–3, p. 239–263, 1996.
  10. Moorthy, Dr. S. Sathiyabama ,(2012). "A Study of Intrusion Detection using Data Mining", In Proceeding of IEEE-International Conference on Advances In Engineering, Science and Management (ICAESM -2012), p. 8-15, March 2012.
  11. Min Wei and Keecheon Kim, (2012). "Intrusion Detection Scheme Using Traffic Prediction forWireless Industrial Networks", in Journal of Communications and Networks, Vol. 14, No. 3, p. 310-318, June 2012.
  12. Quanyan Zhu, Carol Fung, RaoufBoutaba, Tamer Basar,(2012). "GUIDEX: A Game- Theoretic Incentive-Based Mechanism for Intrusion Detection Networks",in IEEE Journal on Selected Areas In Communications, Vol. 30, No. 11, p. 2220-2230, Dec 2012.
  13. Weiming Hu, Jun Gao, Yanguo Wang, Ou Wu, and Stephen Maybank,(2014). "Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection", In Proceeding of IEEE Transactions on Cybernetics, Vol. 44, No. 1, p. 66- 82, Jan 2014.
  14. Zhenwei Yu, Jeffrey J. P. Tsai, and Thomas Weigert,(2007). "An Automatically Tuning Intrusion Detection System", in IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, Vol. 37, No. 2, p. 373-384, April 2007.
  15. Barbara, D. , N. Wu, and S. Jajodia
  16. . "Detecting Novel Network Intrusions Using Bayes Estimators", Proceedings Of the First SIAM Int. Conference on Data Mining, (SDM 2001),Chicago, IL.
  17. Manganaris, S. , M. Christensen, D. Zerkle, and K. Hermiz
  18. . "A data mining analysis Of RTID alarms", Computer Networks, 34, p. 571-577.
  19. Clifton, C. , and G. Gengo
  20. . "Developing Custom Intrusion Detection Filters Using Data Mining", 2000 Military Communications International, Los Angeles, California, October 22-25.
  21. Lee, W. , and S. Stolfo
  22. . "Data Mining Approaches for Intrusion Detection", in Proceedings of the 7th USENIX Security Symposium, San Antonio, TX.
  23. Butt, Muheet Ahmed, and Majid Zaman. "Assessment Model based Data Warehouse: A Qualitative Approach. " International Journal of Computer Applications 62. 10 (2013).
  24. Butt, Muheet Ahmed, and Majid Zaman. "Assessment Model based Data Warehouse: A Qualitative Approach. " International Journal of Computer Applications 62. 10 (2013).
  25. Zaman, Majid, and Muheet Ahmed Butt. "Enterprise Data Backup & Recovery: A Generic Approach. " International Organization of Scientific Research Journal of Engineering (IOSRJEN) (2013): 2278-4721.
  26. MaqboolRao, Nouman, et al. "Distributed Data Warehouse Architecture: An Efficient Priority Allocation Mechanism for Query Formulation. "
  27. Butt, Muheet Ahmed. "COGNITIVE RADIO NETWORK: SECURITY ENHANCEMENTS. " Journal of Global Research in Computer Science 4. 2 (2013): 36-41.
  28. Butt, M. A. , and M. Zaman. "Data Quality Tools for Data Warehousing: Enterprise Case Study. " IOSR Journal of Engineering 3. 1 (2013): 75-76.
  29. Khan, Sajad Mohammad, Muheet Ahmed Butt, and Majid Zaman Baba. "Information Communication Technology: Practices for Academia. "
  30. Khan, Qamar Rayees, et al. "Review of Intrusion and Anomaly Detection Techniques. " International Journal of Modern Engineering Research (IJMER), Volume 4.
Index Terms

Computer Science
Information Sciences

Keywords

DBMS Malicious attacks Threats Intrusion Detection System Data Integrity