Network Packet Data Online Processing for Intrusion Detection System

被引:0
|
作者
Jacobus, Agustinus [1 ]
Sinsuw, Alicia A. E. [1 ]
机构
[1] Sam Ratulangi Univ, Dept Informat, Fac Engn, Manado, Indonesia
关键词
intrusion detection; network-packet data processing; online processing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The existence of intrusion detection systems in computer network as a part of network security tool is very important, with this tool a computer system can detect the intrusion action before it makes more damage. Traditional intrusion detection system using the rule that created by expert for detecting the intrusion, but because of the increasing of internet activity the data to be analyzed in order to establish that rules become large and create the possibility the new intrusion technique cannot detect. Using data mining techniques to find intrusion pattern from network packet data was success to detect intrusion in offline environment, but the effective intrusion detection system must able to detect the intrusion in online environment. Therefore needed a method that can be used to perform online processing of network packets data. This paper discusses the data processing network packets to establish the connection records are complete or incomplete in an effort to enabling the intrusion detection system detecting the intrusion online and based on the test result this method was success to detect the intrusion in online environment.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] A Theoretical Exploration of the Impact of Packet Loss on Network Intrusion Detection
    Smith, Sidney C.
    Hammell, Robert J., II
    Parker, Travis W.
    Marvel, Lisa M.
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2016, 4 (01) : 1 - 10
  • [32] Packet Information Collection and Transformation for Network Intrusion Detection and Prevention
    Beheshti, Mohsen
    Han, Jianchao
    Kowalski, Kazimierz
    Ortiz, Joel
    Tomelden, Johnly
    Alvillar, Damian
    2008 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, : 42 - 48
  • [33] Rule Hashing for Efficient Packet Classification in Network Intrusion Detection
    Yoshioka, Atsushi
    Shaikot, Shariful Hasan
    Kim, Min Sik
    2008 PROCEEDINGS OF 17TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2008, : 614 - 619
  • [34] A Theoretical Exploration of the Impact of Packet Loss on Network Intrusion Detection
    Smith, Sidney C.
    Hammell, Robert J., II
    Parker, Travis W.
    Marvel, Lisa M.
    2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 161 - 166
  • [35] Visualizing network data for intrusion detection
    Abdullah, K
    Lee, A
    Conti, G
    Copeland, JA
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 100 - 108
  • [36] Data analytics for network intrusion detection
    Wang, Lidong
    Jones, Randy
    Journal of Cyber Security Technology, 2020, 4 (02) : 106 - 123
  • [37] Data Preprocessing for Network Intrusion Detection
    Li, Li
    Ye, Yuan
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 867 - 871
  • [38] An intelligent intrusion detection and response system using network quarantine channels: Firewalls and packet filters
    Hooper, Emmanuel
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 1193 - 1198
  • [39] Hardware-software hybrid packet processing for intrusion detection systems
    Sachidananda, S
    Gopalan, S
    Varadarajan, S
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 236 - 243
  • [40] Recurrent network in Network Intrusion Detection System
    Xue, JS
    Sun, JZ
    Zhang, X
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2676 - 2679