Modeling protocol based packet header anomaly detector for network and host intrusion detection systems

被引:0
|
作者
Shamsuddin, Solahuddin B. [1 ]
Woodward, Michael E. [1 ]
机构
[1] Univ Bradford, Dept Comp, Sch Informat, Bradford BD7 1DP, W Yorkshire, England
来源
关键词
anomaly; data base; network intrusion detection system;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper describes an experimental protocol based packet header anomaly detector for Network and Host Intrusion Detection System modelling which analyses the behaviour of packet header field values based on its layer 2, 3 and 4 protocol fields of the ISO OSI Seven Layer Model for Networking. Our model which we call as Protocol based Packet Header Anomaly Detector (PbPHAD) Intrusion Detection System is designed to detect the anomalous behaviour of network traffic packets based on three specific network and transport layer protocols namely UDP, TCP and ICMP to identify the degree of maliciousness from a set of detected anomalous packets identified from the sum of statistically modelled individually rated anomalous field values.
引用
收藏
页码:209 / 227
页数:19
相关论文
共 50 条
  • [41] Characterizing sources and remedies for packet loss in network intrusion detection systems
    Schaelicke, L
    Freeland, JC
    IISWC - 2005: PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL SYMPOSIUM ON WORKLOAD CHARACTERIZATION, 2005, : 188 - 196
  • [42] Anomaly-Based Intrusion Detection of Protocol-Aware Jamming
    Lichtman, Marc
    Reed, Jeffrey H.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 269 - 274
  • [43] Ensemble classifiers for supervised anomaly based network intrusion detection
    Timcenko, Valentina
    Gajin, Slavko
    2017 13TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP), 2017, : 13 - 19
  • [44] Network Anomaly Intrusion Detection Based on Deep Learning Approach
    Wang, Yung-Chung
    Houng, Yi-Chun
    Chen, Han-Xuan
    Tseng, Shu-Ming
    SENSORS, 2023, 23 (04)
  • [45] Fuzzy mega cluster based anomaly network intrusion detection
    Hubballi, Neminath
    Biswas, Santosh
    Nandi, Sukumar
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 82 - 86
  • [46] A Host and Network Based Intrusion Detection For Android Smartphones
    Ariyapala, Kanishka
    Hoang Giang Do
    Huynh Ngoc Anh
    Ng, Wee Keong
    Conti, Mauro
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 849 - 854
  • [47] Anomaly-Based Network Intrusion Detection Using SVM
    Zhang, Yuan
    Yang, Qinghai
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos
    Ghafir, Ibrahim
    AsSadhan, Basil
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [48] Research on methods of network connection based anomaly intrusion detection
    Wang, Y
    Zhang, HM
    Yang, HH
    Wang, XY
    SYSTEM SIMULATION AND SCIENTIFIC COMPUTING, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1304 - 1309
  • [49] IBBO-LSSVM-based network anomaly intrusion detection
    Zhou, Peng
    Chou, Wen-Kuang
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (03) : 352 - 362
  • [50] Data preprocessing for anomaly based network intrusion detection: A review
    Davis, Jonathan J.
    Clark, Andrew J.
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 353 - 375