TITLE

Heterogeneous Time Variant Activity Pattern Based Artificial Network Immune System for Intrusion Detection

AUTHOR(S)
Vasanthi, S.; Chandrasekar, S.
PUB. DATE
May 2014
SOURCE
Australian Journal of Basic & Applied Sciences;May2014, Vol. 8 Issue 7, p1
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Real World applications become more sophisticated and require more adaptable solutions with higher security constraints. Providing such solution with higher security is a challenging task for the service providers where there is higher risk and frequency of different kind of network attacks which arises from various network users. Identifying service attackers is a difficult task and needs a more intensive analysis, because there are situation when people send packets heavily and that increases the overall time delay with an increased hop count due to travelling in longer path. The main objective of the proposed system is to accurately detect the intrusion with less false positive and negative errors. The propose system also maintain high detection rate. We propose a heterogeneous activity pattern based approach which uses number of metrics to compute the genuiness of the incoming packets. The immune system monitors the incoming packet and extracts the heterogeneous time variant features like payload, time to live, hop count, access history, time variant connection, transfer rate. Using the heterogeneous time variant features we compute the legitimate weight. The legitimate weight is used to identify whether the packets is malicious or legitimate. The proposed method increases the performance of the immune system and Intrusion process up to 90% with the help of NASA rule.
ACCESSION #
96583845

 

Related Articles

  • RESEARCH OF NETWORK TRAFFIC ENTROPY AS A DDOS-ATTACK INDICATOR. Babenko, T. V. // Scientific Bulletin of National Mining University;2013, Issue 2, p86 

    ?urpose. In order to improve the efficiency of IDS (intrusion detection systems), ADS (anomaly detection system) and information security systems management we perform theoretical and experimental studies on the possibility of using the real-time calculated values of information entropy as a...

  • Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers. Barry, Bazara I. A. // Journal of Systemics, Cybernetics & Informatics;2012, Vol. 10 Issue 5, p85 

    Network intrusion detection systems (NIDSs) face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors...

  • Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems. Derhab, Abdelouahid; Bouras, Abdelghani // Security & Communication Networks;May2015, Vol. 8 Issue 7, p1193 

    In this paper, we propose an intrusion detection system (IDS) based on four approaches: (i) statistical-based IDS to reduce detection time; (ii) intertwining data acquisition phase and data preprocessing phase to ensure real-time detection; (iii) geometric linear similarity measure that improves...

  • Intelligent Adaptive Intrusion Detection Systems Using Neural Networks (Comparitive study). Ali, Aida O.; Saleh, Ahmed I.; Badawy, Tamer R. // International Journal of Video & Image Processing & Network Secu;Feb2010, Vol. 10 Issue 1, p1 

    Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS's responsibility is...

  • BOTNET TAKEDOWNS: A DRAMATIC DEFENSE, BUT DOES IT CHANGE THE GAME? Richards, Kathleen // Information Security;Apr2013, Vol. 15 Issue 3, p20 

    The article discusses the strategies employed by information security professionals against the growing sophistication of botnets. It cites Kindsight Security Service which provides botnet detection and remediation services to Internet service providers through its Network Intrusion Detection...

  • Protocol Identification System Based on Apriori Algorithm. Wang XiaoPeng; Sun Yunxiao; Wang Bailing; He Hui; Liu Yang // International Journal of Hybrid Information Technology;May2013, Vol. 6 Issue 3, p55 

    This paper presents a set of programme to extract the application-layer protocol features. Based on frequent itemsets mining, the program automatically extracts four most common features of a protocol: characteristic string, session tag, packet length, and packet order. It is experimentally...

  • IP Spoofing Traceback -- Recent Challenges and Techniques. Kumar, Manish; Hanumanthappa, M.; Kumar, T. V. Suresh // International Journal of Advanced Research in Computer Science;May2011, Vol. 2 Issue 3, p152 

    In current Internet communication world, validity of the source of IP packet is an important issue. The problems of IP spoofing alarm legitimate users of the Internet. IP spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with...

  • Cluster based Statistical Anomaly Intrusion Detection for Varied Attack Intensities. Thangavel, M.; Thangaraj, P. // International Journal of Computer Applications;Jun2011, Vol. 24, p27 

    In today's Internet paradigm, the type of intrusion attacks becomes crucial in presenting effective improvement to anomaly intrusion attacks. Anomaly Traffic hacker attacks combined with traditional network intruders was a serious threat to network security. The existing work on intrusion...

  • WebGuard: Enhancing Intrusion Detection in Multi-tier Web Applications. Patil, Asha U.; Dixit, Arati M. // International Journal of Computer Applications;Jun2014, Vol. 95, p29 

    In today's world web applications and internet services have become an integral part of daily life, enabling communication and the management of personal information from anywhere. In order to accommodate humungous increase in demand and data complexity, web applications are moved to multitier...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics