CFP last date
20 May 2024
Reseach Article

Framework for Threat Analysis and AttackModelling of Network Security Protocols

Published on July 2018 by Nachiket Athavale, Shubham Deshpande, Jatin Chavan, Vikash Chaudhary
International Conference on “Internet of Things, Next Generation Networks and Cloud Computing"
Foundation of Computer Science USA
ICINC2017 - Number 1
July 2018
Authors: Nachiket Athavale, Shubham Deshpande, Jatin Chavan, Vikash Chaudhary
2c24ca17-92ac-48bb-a22e-89a26101ff3e

Nachiket Athavale, Shubham Deshpande, Jatin Chavan, Vikash Chaudhary . Framework for Threat Analysis and AttackModelling of Network Security Protocols. International Conference on “Internet of Things, Next Generation Networks and Cloud Computing". ICINC2017, 1 (July 2018), 49-56.

@article{
author = { Nachiket Athavale, Shubham Deshpande, Jatin Chavan, Vikash Chaudhary },
title = { Framework for Threat Analysis and AttackModelling of Network Security Protocols },
journal = { International Conference on “Internet of Things, Next Generation Networks and Cloud Computing" },
issue_date = { July 2018 },
volume = { ICINC2017 },
number = { 1 },
month = { July },
year = { 2018 },
issn = 0975-8887,
pages = { 49-56 },
numpages = 8,
url = { /proceedings/icinc2017/number1/29676-1795/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on “Internet of Things, Next Generation Networks and Cloud Computing"
%A Nachiket Athavale
%A Shubham Deshpande
%A Jatin Chavan
%A Vikash Chaudhary
%T Framework for Threat Analysis and AttackModelling of Network Security Protocols
%J International Conference on “Internet of Things, Next Generation Networks and Cloud Computing"
%@ 0975-8887
%V ICINC2017
%N 1
%P 49-56
%D 2018
%I International Journal of Computer Applications
Abstract

Nowadays everything is computerized including banking and personal records. Also to boost business profits, businessmen have changed their way of operations from physical way to electronic way, for example Flipkart. But as these developments benefit the developer they also increase the chance of exposing all of customer's personal details to malicious users. Hackers can enter into the system and can steal crucial or sensitive information about other authentic users and in case of banks leads to frauds. Security thus, becomes an important issue for all companies and banks. Intrusion detection systems help such companies by detecting in real time whether an intrusion is carried on or not. Here the authors are developing a signature based intrusion detection system which will scan incoming packets and send a warning message to system administrator. Also the authors are implementing a framework and provide it to all the users so that developing intrusion detection based system similar to the built system. The advantage of using framework is that it can be upgraded and re-defined whenever it is needed.

References
  1. Bhange, A. , Syad, A. , & Thakur, S. S. (2012). DDoS Attacks Impact on Network Traffic and its Detection Approach. International Journal of Computer Applications, 40(11), 36-40. doi:10. 5120/5011-7332
  2. Ali, F. A. , & Len, Y. Y. (2011). Development of host based intrusion detection system for log files. 2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA). doi:10. 1109/isbeia. 2011. 6088821
  3. Divya, Surender L. (2013) HSNORT: A Hybrid Intrusion Detection System using Artificial Intelligence with Snort. International Journal Computer Technology & Applications, Vol. 4 (3), pp. 466-470.
  4. Jabez, J. , &Muthukumar, B. (2015). Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach. Procedia Computer Science, 48, 338-346. doi:10. 1016/j. procs. 2015. 04. 191
  5. Subba, B. , Biswas, S. , &Karmakar, S. (2016). A Neural Network based system for Intrusion Detection and attackclassification. 2016 Twenty Second National Conference on Communication (NCC). doi:10. 1109/ncc. 2016. 7561088
  6. Paxson, V. (1999). Bro: a system for detecting network intruders in real-time. Computer Networks, 31(23-24), 2435-2463. doi:10. 1016/s1389-1286(99)00112-7
  7. Dubendorfer, T. , Wagner, A. , &Plattner, B. (n. d. ). A Framework for Real-Time Worm Attack Detection and Backbone Monitoring. First IEEE International Workshop on Critical Infrastructure Protection (IWCIP'05). doi:10. 1109/iwcip. 2005. 2
  8. Mauro Conti, Nicola Dragoni, Viktor Lesyk. (2009). A Survey of Man In The Middle Attacks. IEEE Communication Surveys and Tutorials. doi:10. 1109/COMST. 2016. 2548426
  9. Alan Bivens, ChandrikaPalagiri, Rasheda Smith, Boleslaw Szymanski, Mark Embrechts. (2002). Network based Intrusion detection using neural networks. Proc Intelligent Engineering Systems through Artificial Neural Networks.
  10. Honda, S. , Unno, Y. , Maruhashi, K. , Takenaka, M. , & Torii, S. (2015). TOPASE: Detection of brute force attacks used disciplined IPs from IDS log. 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM). doi:10. 1109/inm. 2015. 7140496
  11. Munz, G. , & Carle, G. (2007). Real-time Analysis of Flow Data for Network Attack Detection. 2007 10th IFIP/IEEE International Symposium on Integrated Network Management. doi:10. 1109/inm. 2007. 374774
  12. Mukaddam, A. , Elhajj, I. , Kayssi, A. , &Chehab, A. (2014). IP Spoofing Detection Using Modified Hop Count. 2014 IEEE 28th International Conference on Advanced Information Networking and Applications. doi:10. 1109/aina. 2014. 62
  13. Idris, N. , &Shanmugam, B. (n. d. ). Artificial Intelligence Techniques Applied to Intrusion Detection. 2005 Annual IEEE India Conference - Indicon. doi:10. 1109/indcon. 2005. 1590122
  14. S. Vijayarani, Maria Sylviaa. S. (2015) Intrusion Detection System – A Study. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Framework Threat Analysis Security Intrusion Detection System (ids) Wireshark Anomaly Detection Mitm Dos / Ddos Ip Spoofing Packet Analysis Attack Detection Network Based Host Based Ids Computer Security.