Sie sind auf Seite 1von 3

International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169

Volume: 4 Issue: 6 311 - 313


_______________________________________________________________________________________________
A Survey of Intrusion Detection Techniques in Computer Network

Miss Vinita R. Shewale1, Dr. Hitendra D.Patil2


Master Student, Computer Engineering, SSVPSS B.S.Deore College of Engineering, India
Professor and Head, Computer Engineering, SSVPSS B.S.Deore College of Engineering, India
1
vinitashewale@gmail.com; 2hitendradpatil@gmail.com

Abstract As advances in the networking technology help to connect distant corners of the globe and as the Internet continues to expand its
influence as a medium for communication, the threat from attackers and criminal enterprises has also grown accordingly. The increasing
occurrence of network attacks is a very big issue to the network services. So, Intrusion Detection System has become a necessary component of
network security. It is used for detection of many known and unknown network vulnerabilities in wired networks. While the Internet service for
any purpose is used, normally who are attacking on the computer network is not known by us. Those network attacks can cause network services
slow, temporarily unavailable, or down for a long period of time. The concern on this work is to perusal various methods of networking attacks
detection and compare them against these methods by considering their pros and cons.

Keywords- Intrusion Detection Systems, signature based detection, anomaly based detection, hybrid; attack; snort

__________________________________________________*****_________________________________________________

4. Probing: It is is an attack in which hacker scans a


I. INTRODUCTION machine or a networking device in such a way that
hacker can determine weaknesses or vulnerabilities
The computer networks expand day by day and number of occurring in the system that may later be misused so
internet users also increases. Sharing of information and as to compromise the system. This technique is
resources among different devices and organizations, make the commonly used in area of data mining e.g. saint,
world become like a small village. Although exchanging portsweep, mscan, nmap etc.[1].
information across computer network had improve the
efficiency, it is also had given an opportunity of cyber-attack. B. Intrusion Detection System
The vast amount of attacks over the Internet make computer Intrusion Detection System (IDS) plays a very
users and many organizations under potential violation of essential role for detecting different kinds of attacks. It is a
security as a result it is strongly required to protect network device (or the software application) that monitors the network
systems, organizations and government agencies from (and system) for detecting malicious activities (that affect the
intrusions. confidentiality, integrity and availability of resources and
A. Networking Attacks services) and generating appropriate alerts.
This is an overview of the four major categories of As shown in Fig. 1, IDS involves mainly components
networking attacks. Every attack on a network can comfortably which are Data pre-processor, Detection algorithm and Alert
be placed into one of these groups filter.
1. Denial of Service (DoS): A DoS attack is a type of
attack in which the hacker makes a computing
resources or memory resources too busy or too full to
serve legitimate networking requests and hence
denying users access to a particular machine e.g.
apache, smurf, neptune, ping of death, back, mail Figure 1. Intrusion Detection System Components
bomb, UDP storm etc. are all the DoS attacks .
System/Network: It is a system that will be monitored
2. Remote to User Attacks (R2L): It is an attack in which and data will be captured for inspection.
a user sends packets to a machine over the internet,
which he or she does not have access to in order to Data pre-processor: It collects and formats the data
expose the machines vulnerabilities and exploit (network traffic/log data) that will be later analyzed by
permissions which a local user can have on the the detection algorithm. In case of network traffic,
computer e.g. xlock, guest, xnsnoop, phf, sendmail data involve packets having headers (routing
dictionary etc. information) and contents (payloads) that are useful
for detecting intrusions. Data from system log
3. User to Root Attacks (U2R): These attacks are the includes an ordered set of system activities.
exploitations in which the hacker starts off on the
system with a normal user account behaving as a Detection algorithm (model): Using detection
normal user and attempts to grab vulnerabilities in the algorithm/model, IDS detects the distinction between
system in order to gain privileges of super user e.g. normal and intrusive traffic.
perl, xterm.
311
IJRITCC | June 2016, Available @ http://www.ijritcc.org
________________________________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 6 311 - 313
_______________________________________________________________________________________________
Alert filter: This always estimates the severity of the B. Anomaly Detection Sceheme based on Principle
detected intrusions (based on decision criteria) and Component Classifier
alerts the operator or manages responsive activities.
M. Shyu et al. [3] proposed Principal Component Anomaly
Filtering is normally done by a set of thresholds that
based detection scheme. It uses principal component analysis
should be set in such a way that IDS can maintain a
as an outlier detection scheme to detect intrusions. This
high level of accuracy and system performance.
scheme is only based on detecting anomalies. They proposed a
There are mainly two techniques used in IDS: Signature novel technique that uses robust principal component classifier
based and Anomaly based. in intrusion detection issues where the training data may be
unsupervised one. Assuming that anomalies can be treated as
a. Signature based detection: It monitors packets on the
network and compare them against the database the outliers, an intrusion predictive model is built from the
of signatures or attributes from known malicious principal components which can be major or minor of the
threats. As a result, signature based systems are normal instances. A measure of difference of intrusive from
capable of attaining high level of accuracy and the normal instance is the distance between the principal
minimal number of false positives in identifying component spaces.
known intrusions. However, little variation in known To establish a detection algorithm, they performed PCA on
attacks may affect the analysis, if detection system is the correlation matrix of normal group. The correlation matrix
not properly configured [7]. is needed to be used because each feature is measured in
b. Anomaly detection: Anomaly based approach collects different levels. It is very important that the training data
should be outliers free before they are used and it is used to
the data relating to the behavior of
determine the detection criteria since outliers can bring increase
user/system/application over a period of time, and
in variance, covariance and correlations.
then it applies statistical tests to the behavior which is
observed, which determines whether that behavior or C. Combining PHAD and NETAD to signature based IDS
action is legitimate or not. A large variety of Snort
techniques including data mining, statistical modeling
M. Aydin et al. [4] discussed a hybrid IDS by combining
and machine learning have been explored as anomaly the two approaches in one system. The hybrid IDS is obtained
detection. by combination of packet header anomaly detection (PHAD)
II. LITERATURE SURVEY and network traffic anomaly detection (NETAD) which are
anomaly-based IDSs with the signature-based IDS Snort that is
After observed limitation of both approaches misuse and an open-source project. Snorts preprocessor design has been
anomaly detection such as in the first approach it cannot detect used to combine PHAD and NETAD with Snort. It is
determined that number of attacks detected will increase as
novel attacks and often fail to detect light modifications to
much more with the hybrid IDS. As a result it can be found that
existing attacks and the second method anomaly based
combining PHAD and NETAD as a preprocessor which are
detectors suffer from a high false alarm rate. Various methods anomaly-based systems with the misuse-based IDS Snort,
has been proposed in different researches to overcome the contributes to intrusion detection positively or completely [4].
above problems with intrusion detection based system in both
approaches misuse and anomaly detection based on hybrid D. Hybrid Approach based on Pattern Matching Engine and
anomaly detection. Neural Network
Another research for this had been devoted, to hybrid IDS C. Amza et al. [5] planned a unique Intrusion Detection
by gathering misuse and anomaly detection, using data mining System that uses a hybrid approach supported a pattern
algorithms as the data processing for vast amounts of security matching engine and a neural network functioning in
audit data, and generates detection models and test models parallel to boost the detection potency. This approach relies on
separately from the network data. the Netpy traffic observance and analysis tool that they
developed. Netpy is a network traffic analysis tool using
A. Hybrid Anomaly Detection Based Methodology Netflow knowledge. Existing features are used to develop a
J. Marin et al. [2] described some preliminary results complex IDS supported pattern matching, as well as anomaly
considering the robustness and also the generalization detection.
capabilities of the machine learning techniques in making user Netpy is an associate degree application that involves the
profiles based on the selection and subsequent classification of help of the administrator by observing the state of a
command line arguments. The method is based on the network. It can be used to notice if there are any unauthorized
assumption that legitimate users can be categorized based on open ports, interior worms or viruses, external applications
the percentage of commands they use in a specified period of scanning the network systems and many of alternative issues.
time. This novel approach is ready to efficiently detect known
classes of attacks, as well as unknown ones. Since the two
The hybrid approach they employed starts with the detection solutions run in parallel it additionally offer a way to
application of expert rules for reducing the dimensionality of filter and group the security alerts to attenuate the number of
the data, followed by the initial clustering of the data and then notifications which is able to be sent to the network
it does subsequent refinement of the cluster locations using the
administrator.
competitive network called Learning Vector Quantization.

312
IJRITCC | June 2016, Available @ http://www.ijritcc.org
________________________________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 6 311 - 313
_______________________________________________________________________________________________
E. A serial Combination of Anomaly and Misuse IDSes engine and detection
Applied to HTTP Traffic neural component to
network detect
E. Tombini [6] et al. described in their paper regarding anomalies in
combining an anomaly and a misuse IDSes that offers the the network
benefit of separating the monitored events between intrusive, traffic.
The
normal or unqualified classes (i.e. not known as an attack,
unqualified
however not acknowledged as safe either). They provided a A framework
A Serial events
framework to systematically reason regarding the mix of with
Combination More Accuracy require
anomaly and misuse components. This framework applied to combination of
of Anomaly and less time further
internet servers leads to a serial architecture, using anomaly anomaly and
and Misuse consuming, low investigatio
misuse
component which is drastic with a sensitive misuse based IDSes rate of false n in order
components(W
component. Applied to negatives to be
IDS) applied to
HTTP qualified as
This design provides the operator with higher qualification web servers
Traffic safe or
of the detection results, raises lower quantity of false alarms intrusive
and unqualified events. Analyzing web server log files is a vital
issue, as web servers and proxies offer a universal gateway to
the information system. They have been employing a web IV. CONCLUSION
intrusion detection system (WIDS) to research in batch mode In this paper we have described the different networking
web server log files to detect compromise attempts and the attacks in wired network and intrusion detection system. This
worm infections. Table 1 shows the comparison of different paper presents review of various attack detection techniques
attack detection techniques used.
and how they are used for detecting number of attacks in wired
III. COMPARISON OF TECHNIQUES network. In literature survey we have described the attack
detection techniques, and various issues involved in the
TABLE I. COMPARISON OF ATTACK DETECTION TECHNIQUES
process. In tabular form we summarized the attack detection
Basic techniques for wired network. The limitation of previous
Technique Advantage Limitation
Concept techniques in intrusion detection system in term of detected
Initial new attacks and false alarm rate respectively had motivated to
clustering of
come up with the idea to integrate them referred to as Hybrid
data using K-
Means and IDS. Hence the aim is to combine both algorithms that are
Hybrid refined cluster Reduce misuse based and anomaly based in order to enhance system
anomaly locations with dimensionality Less security and help IDS user to decide about detected attacks by
detection use of a of the data using classificati the system.
based competitive Genetic on rate
methodology network Algorithm REFERENCES
referred as
Learning [1] G M. S. Hoque, M. A. Mukit and M. A. N. Bikas, "An
Vector implementation of Intrusion Detection System using Genetic
Quantization Algorithm," International Journal of Network Security & Its
Applications (IJNSA), vol. 4, no. 2, March 2012.
Covariance
Exhibits better [2] J. Marin, D. Ragsdale and J. Surdu, "A Hybrid Approach to the
Anomaly Principal matrix is
detection rate Profile Creation and Intrusion Detection," in DARPA
detection component difficult to
than other well- Information Survivability Conference and Exposition , 2001.
technique analysis based be
known outlier [3] M. L. Shyu, S. C. Chen, K. Sarinnapakorn and L. Chang, "A
based on anomaly evaluated
based anomaly novel anomaly detection scheme based on principal component
Principal detection in an
detection classifier," in Proceedings of the IEEE Foundations and New
Component technique accurate
algorithms Directions of Data Mining Workshop, Melbourne, FL, USA,
Classifier manner
2003.
Combination
[4] M. A. Aydin, A. H. Zaim and K. G. Ceylan, "A hybrid intrusion
of each Snort
detection system design for computer network security,"
with Packet
Combining Number of Computers & Electrical Engineering, vol. 35, pp. 517-526, May
Header
PHAD and attacks detected Suffer from 2009.
Anomaly
NETAD to increases much high false [5] C. Amza, C. Leordeanu and V. Cristea, "Hybrid Network
Detection
signature- more with the alarm rate Intrusion Detection," in IEEE International Conference on
(PHAD) and
based IDS hybrid IDS Intelligent Computer Communication and, 2011.
Network
Snort [6] E. Tombini, H. Debar, L. Me and M. Ducasse, "A Serial
Traffic
Combination of Anomaly and Misuse IDSes Applied to HTTP
Anomaly
Traffic," in Proceedings of the 20th Annual Computer Security
Detection
Applications Conference, 2004.
Hybrid Combined a Increase Not able to
[7] D. J. Brown, B. Suckow and T. Wang, A Survey of Intrusion
approach basic pattern Efficiency and detect large
Detection Systems, Department of Computer Science, University
based on matching produce few number of
of California, San Diego, 2002.
pattern engine with a false positives attacks
matching neural network

313
IJRITCC | June 2016, Available @ http://www.ijritcc.org
________________________________________________________________________________________________________

Das könnte Ihnen auch gefallen