Statistic Approached Dynamically Detecting Security Threats and Updating a Signature-Based Intrusion Detection System's Database in NGN

被引:7
作者
Abdiyeva-Aliyeva, Gunay [1 ]
Hematyar, Mehran [2 ]
机构
[1] Azerbaijan State Econ Univ, UNEC Business Sch, Baku, Azerbaijan
[2] Azerbaijan Tech Univ, Cyber Secur, Baku, Azerbaijan
关键词
intrusion detection system; signature-based; anomaly-based; traffic; AI based IDs; artificial intelligence;
D O I
10.12720/jait.13.5.524-529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks threatening the network and information security have increased, especially during the current rapid IT revolution. Therefore, a monitoring and protection system should be used to secure the computer networks. An intrusion detection system is very crucial on the market since it helps to control the network traffic and alerts the users during illegal access to the network. IDS is divided into three types: signature-based IDS, anomaly-based IDS, and both. Automatically updating the attack list to overcome new attack types is one of the main challenges of signature-based IDS. Most IDS or websites use recently detected attack signatures to update their databases manually or remotely. This article proposes a new AI model that uses a filter engine that functions as a second IDS engine to automatically update the attack list by AI. The results show that using the proposed model can improve the overall accuracy of IDS. The proposed model uses an IP-Factor (IPF) and Non-IP-Factor (NIPF) blacklist that can automatically detect the threats and update the IDS database with new attack features without manual intervention, as well as define new attack features based on similarity.
引用
收藏
页码:524 / 529
页数:6
相关论文
共 10 条
[1]  
Almutairi A. H., 2017, PROC INT C FRONTIERS, P1
[2]   Dynamically Detecting Security Threats and Updating a Signature Based Intrusion Detection System's Database [J].
AlYousef, Mutep Y. ;
Abdelmajeed, Nabih T. .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES 2019), 2019, 159 :1507-1516
[3]  
[Anonymous], 2019, U.S
[4]  
[Anonymous], 2019, KASP SEC B 2019
[5]  
Debar H., 2000, Proc. Connect, V2000, P1
[6]  
Folorunso O., 2016, J INF PRIVACY SECUR, V12, P181, DOI DOI 10.1080/15536548.2016.1257680
[7]  
Innella Paul., 2001, An Introduction to Intrusion Detection Systems
[8]  
Rademacher L., 2017, The Disadvantages of Intrusion Detection Systems
[9]  
Sheenam S. D., 2016, IOSR J COMPUTER ENG, V18, P20
[10]  
Uddin M., 2010, INT J NETWORK SECURI, P129