Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Role of AES and DES Based Heartbeat Events for Enhancing Fault Tolerance of Intrusion Detection System

Print
PDF
International Conference and Workshop on Emerging Trends in Technology
© 2011 by IJCA Journal
Number 1 - Article 4
Year of Publication: 2011
Authors:
Perminder Kaur
Dhavleesh Rattan
Amit Kumar Bhardwaj

Perminder Kaur, Dhavleesh Rattan and Amit Kumar Bhardwaj. Role of AES and DES based Heartbeat Events for Enhancing Fault Tolerance of Intrusion Detection System. IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET) (1):15-21, 2011. Full text available. BibTeX

@article{key:article,
	author = {Perminder Kaur and Dhavleesh Rattan and Amit Kumar Bhardwaj},
	title = {Role of AES and DES based Heartbeat Events for Enhancing Fault Tolerance of Intrusion Detection System},
	journal = {IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET)},
	year = {2011},
	number = {1},
	pages = {15-21},
	note = {Full text available}
}

Abstract

Proliferation of heterogeneous network systems and increasing usage of Internet makes network security issue to be more and more important. Intrusion detection systems (IDS) are increasingly a key part of system defense, often operating under a high level of privilege to achieve their purposes. In accordance with the increasing importance of intrusion detection systems (IDS), users justifiably demand the trustworthiness of the IDS. However, IDS themselves are prone to various attacks and it becomes the natural primary target of hostile attacks with the aim of disabling the detection feature and allowing an attacker to operate without being detected. This paper suggests that intrusion detection system (IDS) must be fault tolerant; otherwise, the intruder may first subvert the IDS then attack the target system at will. Making an IDS fault tolerant [2] is a challenging task. The aim of this research paper is to enhance the fault tolerance of IDS using AES and DES based heart beat events. Brute Force attack has been simulated and the effectiveness of encrypted heartbeat event based fault tolerance for Intrusion Detection System is evaluated.

Reference

  • B. Forouzan, 2009. “Data Communications and Networking 4th Ed.”, Tata McGraw Hill, 2009.
  • C. Krugel, and, T. Toth 2000. “A Survey On Intrusion Detection Systems”, Technical Report, Technical University of Vienna, Version 1.0, December-2000.
  • D. Curry and H. Debar 2003. Intrusion Detection Message Exchange Format. http:// www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-10.txt. August 2003.
  • Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader, Mohie Mohamed Hadhoud, 2008. “Performance Evaluation of Symmetric Encryption Algorithms”, International Journal Of Computer Science and Network Security, Vol 8, No.12, pp.280-286, Dec 2008.
  • Dong Yu and Frincke, S. 2004. “Towards Survivable Intrusion Detection System”, Proceedings of the 37th Hawaii International Conference on System Sciences, Vol 9, 2004
  • D. Zamboni, 2001. “Using Internal Sensors For Computer Intrusion Detection”, Phd. Thesis, Purdue University, Aug. 2001.
  • E. H. Spafford, and D. Zamboni, 2000. “Intrusion detection using autonomous agents”, Computer Networks, 34(4):547– 570, October 2000.
  • Federal Information Processing Standards Publication 197 Announcing the “ADVANCED ENCRYPTION STANDARD” (AES), November 26, 2001.
  • G. H. Kim, and E. H. Spafford, 1994. “The design and Implementation of Tripwire: A File System Integrity Checker”, Proc. Conference on Computer and Communications Security,Vol 2, pp. 18-29, November 1994.
  • H. Debar, 2002. “An Introduction to Intrusion Detection Systems”, Proceedings of Connect’2000, Version 1.0, 2002.
  • I. Buckley, and E.B. Fernandez, 2009. “Three Patterns For Fault Tolerance”, OOPSLA Mini PloP Workshop, 2009.
  • I. M. Hegazy, T. Al-Arif, Z. T. Fayed and H. M. Faheem, 2003. “A multi-agent based system for intrusion detection”, IEEE Potentials, 22:28–31, October/November 2003.
  • J. Daemen, and, V. Rijmen 2001. “Rijndael: The Advanced Encryption Standard. D r. Dobb's Journal”, March 2001, pp. 137-139.
  • J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. lsacoff, E. Spafford, and D. Zamboni, 1998. “Architecture for Intrusion Detection using Autonomous Agents”, COAST Technical Report, COAST Laboratory, Purdue University,1998.
  • K.N. Levitt, and S. Cheung, 2000. “Common Techniques in Fault-Tolerance and Security”, Proc. of the Dependable Computing for Critical Applications 4, pp. 373-377, 4-6 Jan. 2000.
  • Lindonete Siqueira and Zair Abdelouahab, 2006. “A Fault Tolerance Mechanism for Network Intrusion Detection System based on Intelligent Agents (NIDIA)”. Proc. The Fourth IEEEWorkshop on Software Technologies for Future Embedded and Ubiquitous Systems, and the Second International Workshop on Collaborative Computing, Integration, and Assurance (SEUS-WCCIA'06) , Vol 00, pp. 49-54, 2006.
  • Liwei Kuang and Mohammad Zulkernine 2008. An “Intrusion-Tolerant Mechanism for Intrusion Detection Systems”, Proc. 2008 Third International Conference on Availability, Reliability and Security, pp.319-326, 2008.
  • M. Jahnke, 2002. “An Open and Secure Infrastructure for Distributed Intrusion Detection Sensors”. Proceedings of the NATO Regional Conference on Military Communications and Information Systems RCMCIS 2002, 9-11 October 2002. [19] P. Baskerville, 2006. “Intrusion Prevention Systems: How Do They Prevent Intrusions?”, Master Thesis, University of Otago, Dunedin, New Zealand, March 2006.
  • Pabitra Mohan Khilar, Jitendra Kumar Singh, Sudipta Mahapatra, 2008. “Design and Evaluation of a Failure Detection Algorithm for Large Scale Ad Hoc Networks Using Cluster Based Approach”, Proc.2008 International Conference on Information Technology , Vol 00, pp.153-158, 2008.
  • R. Lemos, and J. L. Fiadeiro, 2002. “An Architectural Support for Self-Adaptive Software for Treating Faults”, Proceedings of the 1st ACM SIGSOFT Workshop on Self-Healing Systems, pp. 39-42, 2002.
  • R. .Shashikumar and L.C.S. Gouda, 2009 ,” Self-Healing Reconfigurable FPGA Based Fault Tolerant Security Model for Shared Internet Resources” IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009
  • S. Cheung, 1999. “An Intrusion Tolerance Approach for Protecting Network Infrastructures”, Ph.D. Dissertation, University of California, Davis, September 1999.
  • S. Sidiroglou, O. Laadan, C. R. Perez, N. Viennot, J. Nieh, and A. D. Keromytis, 2009. “ASSURE: Automatic Software Self-Healing Using Rescue Points”, Proc. Of the 14th ACM International conference on Architectural support for programming languages and operating systems, pp. 37-48, 2009.
  • T. Schluessler, P. Rajagopal, “OS Independent Run-Time System Integrity Services”, Research Paper, IT Innovation and Research, Intel Corporation, Nov. 2005.
  • V. Chatzigiannakis, G. Androulidakis, M. Grammatikou, and B. Maglaris, 2004. “A Distributed Intrusion Detection Prototype using Security Agents”, Workshop of the HP OpenView University Association, 2004.
  • W. Stallings, 2005. “Cryptography and Network Security” 4th Ed, ' Prentice Hall, 2005,PP. 58-309 .
  • W.T. Work, 2003. “Intrusion Detection Systems- What are they and How do they work?”, Technical Report, June 2003.
  • Y.P. Shen, W.T. Tsai, S. Bhattacharya, and T Liu, “Attack Tolerant Enhancement of Intrusion Detection Systems”, Proc. 21st Century Military Communications Conference, Vol 1, pp. 425-429.