A hybrid intrusion detection system design for computer network security

被引:142
作者
Aydin, M. Ali [1 ]
Zaim, A. Halim [1 ]
Ceylan, K. Goekhan [1 ]
机构
[1] Istanbul Univ, Fac Engn, Dept Comp Engn, TR-34320 Istanbul, Turkey
关键词
Computer networks; Computer network security; Intrusion detection systems; Hybrid intrusion detection system;
D O I
10.1016/j.compeleceng.2008.12.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Intrusion detection systems can be misuse-detection or anomaly detection based. Misuse-detection based IDSs can only detect known attacks whereas anomaly detection based IDSs can also detect new attacks by using heuristic methods. In this paper we propose a hybrid IDS by combining the two approaches in one system. The hybrid IDS is obtained by combining packet header anomaly detection (PHAD) and network traffic anomaly detection (NETAD) which are anomaly-based IDSs with the misuse-based IDS Snort which is an open-source project. The hybrid IDS obtained is evaluated using the MIT Lincoln Laboratories network traffic data (IDEVAL) as a testbed. Evaluation compares the number of attacks detected by misuse-based IDS on its own, with the hybrid IDS obtained combining anomaly-based and misuse-based IDSs and shows that the hybrid IDS is a more powerful system. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:517 / 526
页数:10
相关论文
共 33 条
  • [1] [Anonymous], 1 INT WORKSH REC ADV
  • [2] [Anonymous], THESIS FLORIDA I TEC
  • [3] [Anonymous], 2007, NIST SPECIAL PUBLICA
  • [4] Bace R., 2000, Intrusion Detection
  • [5] BACE R, 1999, INTRO INTRUSION DETE
  • [6] Bace R., 2001, NIST Special Publication on Intrusion Detection Systems
  • [7] Data set, 1999, DATA SET DARPA INTRU
  • [8] DAYIOGLU B, 2001, THESIS GRADUATE SCH
  • [9] Debar H., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P240, DOI 10.1109/RISP.1992.213257
  • [10] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232