CFP last date
20 May 2024
Reseach Article

Efficient Technique for Boosting Attack Detection Rate over a Host or Network System

by Shashikant Sharma, Vineeta Soni, Nitesh Pradhan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 4
Year of Publication: 2016
Authors: Shashikant Sharma, Vineeta Soni, Nitesh Pradhan
10.5120/ijca2016911026

Shashikant Sharma, Vineeta Soni, Nitesh Pradhan . Efficient Technique for Boosting Attack Detection Rate over a Host or Network System. International Journal of Computer Applications. 147, 4 ( Aug 2016), 37-46. DOI=10.5120/ijca2016911026

@article{ 10.5120/ijca2016911026,
author = { Shashikant Sharma, Vineeta Soni, Nitesh Pradhan },
title = { Efficient Technique for Boosting Attack Detection Rate over a Host or Network System },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 4 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 37-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number4/25644-2016911026/ },
doi = { 10.5120/ijca2016911026 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:51:02.508337+05:30
%A Shashikant Sharma
%A Vineeta Soni
%A Nitesh Pradhan
%T Efficient Technique for Boosting Attack Detection Rate over a Host or Network System
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 4
%P 37-46
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, with the growth of network technologies and its sizes the ratio of attacks has also increases. An attack is an event which has been designed with the aim to bypass the security parameters such as confidentiality, integrity, and/or availability of a standalone computer system or a network. Sometime attacks may cause of heavy loss for an individual, or an organization. To reduce an effect of attacks, it is good to detects at an early stage as it entered in a system or network. However, since the age of computer network number of researchers and industry communities has proposed a variety of exclusive attack detection algorithms in order to prevent information from such threats but each approach has its own problem in their performance. On the other hand most of the accessible techniques use signature base algorithm, detect only previously identified attack types, fails to detect the new attacks and produce huge false alarms so not be suitable for high pace networks. These issues severely restrict the utility of deterrence system. This paper has considered such issues and proposed a novel attack detection technique which generates low false alarms with enhancing the attack detection rate of known as well as anomaly attacks over the network.

References
  1. Frank Kargl, Jörn Maier, Stefan Schlott, Michael Weber ―Protecting Web Servers from Distributed Denial of Service Attacks‖ ACM 1-58113-348-0/01/0005. May 1-5, 2001,
  2. Anita K. Jones and Robert S. Sielken –“Computer System Intrusion Detection A Survey “International Journal of Computer Theory and Engineering, Vol.2, No.6, December, 2010.
  3. Khaled Labib, V. Rao Vemuri ―Detecting and Visualizing Denial-of-Service and Network Probe Attacks Using Principal Component Analysis‖, 2006.
  4. K. Kendall, A database of computer attacks for the evaluation of intrusion detection sytsems, Thesis, MIT, 1999.
  5. Dorothy E. Denning, and P.G. Neumann “Requirement and model for IDES- A real-time intrusion detection system,” Computer Science Laboratory, SRI International, Menlo Park, CA 94025-3493, Technical Report # 83F83-01-00, 1985.
  6. Barbarà, D., Couto, J., Jajodia, S., Popyack, L., and Wu, N., ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection, ACM SIGMOD Record, 30(4), 2001,pp. 15-24.
  7. Wenke Lee and Salvatore J. Stolfo, ―A Framework for Constructing Features and Models for Intrusion Detection Systems‖, ACM Transactions on Information and System Security (TISSEC), Volume 3, Issue 4, November 2000.
  8. Hamdan.O.Alanazi, Rafidah Md Noor, B.B Zaidan, A.A Zaidan “Intrusion Detection System: Overview” Journal Of Computing, Volume 2, Issue 2, February 2010, Issn 2151-9617
  9. S. Peddabachigaria, A. Abrahamb, C. Grosanc and J. Thomas, "Modelling intrusion detection system using hybrid intelligent systems," Computer Applications, vol.30, 2007, pp.
  10. Chi Ho Tsang, Sam Kwong, and Hanli Wang, “Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection.” Pattern Recognition, 40(9), 2007, pp. 2373–2391.
  11. M. Saniee Abadeh, J. Habibi, and C. Lucas, “Intrusion detection using a fuzzy genetics-based learning algorithm.” Journal of Network and Computer Applications, 30(1), 2007, pp. 414–428.
  12. Animesh Patcha and Jung-Min Park. An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks, 51(12):3448– 3470, 2007.
  13. D.-H. Shin and S. Bagchi, “Optimal monitoring in multi-channel multi-radio wireless mesh networks,” in Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2009.
  14. A. Hassanzadeh, R. Stoleru, and B. Shihada, “Energy efficient monitoring for intrusion detection in battery-powered wireless mesh networks,” in Proceedings of the 10th International Conference on Ad Hoc Networks and Wireless (ADHOC- NOW), 2011.
  15. F. Hugelshofer, P. Smith, D. Hutchison, and N. J. Race, “OpenLIDS: a lightweight intrusion detection system for wireless mesh networks,” in Proceedings of the 15th Annual International Conference on Mobile Computing and Networking (MobiCom), 2009.
  16. L. Portnoy, E. Eskin, and S. Stolfo, ―Intrusion Detection with Unlabeled Data Using Clustering,‖ Proc. ACM Workshop Data Mining Applied to Security (DMSA), 2001.
  17. K. Burbeck & N.Y. Simmin, “Adaptive Real-Time Anomaly Detection with Incremental Clustering”, Information Security Technical Report, Vol. 12, No. 1, Pp. 56–67. 2007.
  18. R. Fei, L. Hu & H. Liang, “Using Density-based Incremental Clustering for Anomaly Detection”, Proceedings of the 2008 International Conference on Computer Science and Software Engineering, Vol. 3, Pp. 986–989. 2008
  19. J.H. Lee, S.G. Sohn, B.H. Chang & T.M. Chung, “PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-based Systems”, ETRI Journal, Vol. 31, No. 5, Pp. 554–564. 2009.
  20. Mario Golling, Robert Koch, Rick Hofstede “Towards Multi-layered Intrusion Detection in High-Speed Networks” 2014 6th International Conference on Cyber Confl ict P.Brangetto, M.Maybaum, J.Stinissen (Eds.) 2014 © NATO CCD COE Publications, Tallinn
  21. Archana I. Patil, Girish Kumar Patnaik, Ashish T. Bhole” Network Intrusion Detection using Layered Approach and Hidden Markov Model” International Journal of Computer Applications (0975 – 8887) Volume 93 – No.13, May 2014
  22. Noureddine Assad, Brahim Elbhiri, Moulay Ahmed Faqihi, Mohamed Ouadou, and Driss Aboutajdine “Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks” Hindawi Publishing Corporation Journal of Computer Networks and Communications Volume 2015.
  23. Marco Caselli, Emmanuele Zambon, Frank Kargl “Sequence-aware Intrusion Detection in Industrial Control Systems” CPSS’15, April 14, 2015, Singapore. ACM 978-1-4503-3448-8/15/04.
  24. Minakshi Bisen & Amit Dubey “An Intrusion Detection System based on Support Vector Machine using Hierarchical Clustering and Genetic Algorithm” The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), Vol. 3, No. 1, January 2015.
  25. Jabez J, Dr.B.Muthukumar “Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach” International Conference on Intelligent Computing, Communication & Convergence, Procedia Computer Science 48 ( 2015 ) 338 – 346, ELSEVIER
  26. Ibrahim Goni, Ahmed Lawal “A Propose Neuro-Fuzzy-Genetic Intrusion Detection System” International Journal of Computer Applications (0975 – 8887) Volume 115 – No. 8, April 2015
  27. Michel Toulouse, B`ui Quang Minh, Philip Curtis “A consensus based network intrusion detection System” arXiv:1505.05288v1 [cs.CR] 20 May 2015
  28. James P.Anderson. ComputerSecurity Threat Monitoring and Surveillance,1980.Lastaccessed:Novmeber30,2008. http://csrc.nist.gov/publications/history/ande80.pdf
  29. Prabhjeet Kaur, Amit Kumar Sharma, Sudesh Kumar Prajapat “ Madam ID for intrusion detection using data mining” IJRIM volume 2, issue 2, February 2012
  30. Yogendra Kumar Jain and Upendra “An Efficient Intrusion Detection Based on Decision Tree Classifier Using Feature Reduction” International Journal of Scientific and Research Publications, Volume 2, Issue 1, January 2012.
  31. G.V. Nadiammai, S.Krishnaveni, M. Hemalatha “ A Comprehensive Analysis and study in Intrusion Detection System using Data Mining Techniques” International Journal of Computer Applications (0975 – 8887) Volume 35– No.8, December 2011
  32. R.Shanmugavadivu, Dr.N.Nagarajan “Learning of Intrusion Detector in Conceptual Approach of Fuzzy Towards Intrusion Methodology” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 5, May 2012
  33. Amin Hassanzadeh, Radu Stoleru, Michalis Polychronakisy , Geoffrey Xie “RAPID: A Traffic-Agnostic Intrusion Detection for Resource-Constrained Wireless Mesh Networks” Technical Report 2014, Texas A& M University Copyright 2014 LENSS.
  34. Dr. S.Vijayarani and Ms. Maria Sylviaa.S “Intrusion Detection System – A Study” International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
  35. Ashish Negi, Himanshu Saini” An Overview of Intrusion Detection System in Computer Networks” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-4 Issue-7, December 2014
  36. Uma Vishwakarma, Prof. Anurag Jain “Reduces Unwanted Attribute in Intruder File Based on Feature Selection and Feature Reduction Using ID3 Algorithm” Uma Vishwakarma et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1) , 2014, 896-900
  37. Available from: http://nsl.cs.unb.ca/NSL-KDD/
  38. Long-Sheng Chen, Jhih-Siang Syu “Feature Extraction Based Approach for Improving the Performance of Intrusion Detection System” Proceedings of the International MultiConference of Engineers and Computer Scientists 2015 Vol I, IMECS 2015, March 18 - 20, 2015, Hong Kong
  39. http://www.cs.waikato.ac.nz/ml/weka/arff.html
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Security Data Mining Feature Extraction.