DocumentCode :
163470
Title :
Network Intrusion Detection System using attack behavior classification
Author :
Al-Jarrah, Omar ; Arafat, Ahmad
Author_Institution :
Dept. of Comput. Eng., Jordan Univ. of Sci. & Technol., Irbid, Jordan
fYear :
2014
fDate :
1-3 April 2014
Firstpage :
1
Lastpage :
6
Abstract :
Intrusion Detection Systems (IDS) have become a necessity in computer security systems because of the increase in unauthorized accesses and attacks. Intrusion Detection is a major component in computer security systems that can be classified as Host-based Intrusion Detection System (HIDS), which protects a certain host or system and Network-based Intrusion detection system (NIDS), which protects a network of hosts and systems. This paper addresses Probes attacks or reconnaissance attacks, which try to collect any possible relevant information in the network. Network probe attacks have two types: Host Sweep and Port Scan attacks. Host Sweep attacks determine the hosts that exist in the network, while port scan attacks determine the available services that exist in the network. This paper uses an intelligent system to maximize the recognition rate of network attacks by embedding the temporal behavior of the attacks into a TDNN neural network structure. The proposed system consists of five modules: packet capture engine, preprocessor, pattern recognition, classification, and monitoring and alert module. We have tested the system in a real environment where it has shown good capability in detecting attacks. In addition, the system has been tested using DARPA 1998 dataset with 100% recognition rate. In fact, our system can recognize attacks in a constant time.
Keywords :
computer network security; neural nets; pattern classification; HIDS; NIDS; TDNN neural network structure; alert module; attack behavior classification; computer security systems; host sweep attacks; host-based intrusion detection system; network intrusion detection system; network probe attacks; packet capture engine; pattern classification; pattern recognition; port scan attacks; preprocessor; reconnaissance attacks; unauthorized accesses; IP networks; Intrusion detection; Neural networks; Pattern recognition; Ports (Computers); Probes; Protocols; Host sweep; Intrusion Detection Systems; Network probe attack; Port scan; TDNN neural network;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Communication Systems (ICICS), 2014 5th International Conference on
Conference_Location :
Irbid
Print_ISBN :
978-1-4799-3022-7
Type :
conf
DOI :
10.1109/IACS.2014.6841978
Filename :
6841978
Link To Document :
بازگشت