A hybrid intrusion detection system design for computer network security

被引:142
作者
Aydin, M. Ali [1 ]
Zaim, A. Halim [1 ]
Ceylan, K. Goekhan [1 ]
机构
[1] Istanbul Univ, Fac Engn, Dept Comp Engn, TR-34320 Istanbul, Turkey
关键词
Computer networks; Computer network security; Intrusion detection systems; Hybrid intrusion detection system;
D O I
10.1016/j.compeleceng.2008.12.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Intrusion detection systems can be misuse-detection or anomaly detection based. Misuse-detection based IDSs can only detect known attacks whereas anomaly detection based IDSs can also detect new attacks by using heuristic methods. In this paper we propose a hybrid IDS by combining the two approaches in one system. The hybrid IDS is obtained by combining packet header anomaly detection (PHAD) and network traffic anomaly detection (NETAD) which are anomaly-based IDSs with the misuse-based IDS Snort which is an open-source project. The hybrid IDS obtained is evaluated using the MIT Lincoln Laboratories network traffic data (IDEVAL) as a testbed. Evaluation compares the number of attacks detected by misuse-based IDS on its own, with the hybrid IDS obtained combining anomaly-based and misuse-based IDSs and shows that the hybrid IDS is a more powerful system. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:517 / 526
页数:10
相关论文
共 33 条
  • [21] MAHONEY MV, 2000, P 8 INT C KNOWL DISC, P376
  • [22] MAHONEY MV, 2003, P ACM SAC
  • [23] MAHONEY MV, CS200104 FLOR I TECH
  • [24] MAHONEY MV, 2003, CS200208 FLOR I TECH
  • [25] NETWORK INTRUSION DETECTION
    MUKHERJEE, B
    HEBERLEIN, LT
    LEVITT, KN
    [J]. IEEE NETWORK, 1994, 8 (03): : 26 - 41
  • [26] Neumann PG, 1999, PROCEEDINGS OF THE WORKSHOP ON INTRUSION DETECTION AND NETWORK MONITORING (ID '99), P73
  • [27] NOEL S, 2002, MODERN INTRUSION DET
  • [28] REHMAN RU, 2003, UPPER SADDLE RIVER
  • [29] ROESCH M, 1999, P 13 LISA C USENIX A
  • [30] RUSSELL R, 2003, SNORT INTR DET 2 0