scholarly journals Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach

2015 ◽  
Vol 48 ◽  
pp. 338-346 ◽  
Author(s):  
J. Jabez ◽  
B. Muthukumar
2016 ◽  
Vol 10 (4) ◽  
pp. 1-32 ◽  
Author(s):  
Abdelaziz Amara Korba ◽  
Mehdi Nafaa ◽  
Salim Ghanemi

In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchical architecture, cluster nodes run a host specification-based intrusion detection system to detect specification violations attacks such as fabrication, replay, etc. While the cluster heads run an anomaly-based intrusion detection system to detect wormhole and rushing attacks. The proposed specification-based detection approach relies on a set of specifications automatically generated, while anomaly-detection uses statistical techniques. The proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security framework is evaluated by simulation in presence of malicious nodes that can launch different attacks. Simulation results show that the proposed hybrid security framework performs significantly better than other existing mechanisms.


2019 ◽  
Vol 8 (4) ◽  
pp. 4668-4671

A Distributed denial of Service attacks(DDoS) is one of the major threats in the cyber network and it attacks the computers flooded with the Users Data Gram packet. These types of attacks causes major problem in the network in the form of crashing the system with large volume of traffic to attack the victim and make the victim idle in which not responding the requests. To detect this DDOS attack traditional intrusion detection system is not suitable to handle huge volume of data. Hadoop is a frame work which handles huge volume of data and is used to process the data to find any malicious activity in the data. In this research paper anomaly detection technique is implemented in Map Reduce Algorithm which detects the unusual pattern of data in the network traffic. To design a proposed model, Map Reduce platform is used to hold the improvised algorithm which detects the (DDoS) attacks by filtering and sorting the network traffic and detects the unusual pattern from the network. Improvised Map reduce algorithm is implemented with Map Reduce functionalities at the stage of verifying the network IPS. This Proposed algorithm focuses on the UDP flooding attack using Anomaly based Intrusion detection system technique which detects kind of pattern and flow of packets in the node is more than the threshold and also identifies the source code causing UDP Flood Attack.


2019 ◽  
Vol 3 (2) ◽  
pp. 23
Author(s):  
Alimuddin Yasin ◽  
Ismail Mohidin

DDoS menjadi satu masalah utama dalam keamanan internet dalam dekade terakhir. Intrusion Detection System adalah sebuah aplikasi perangkat lunak atau perangkat keras yang dapat mendeteksi aktivitas yang mencurigakan dalam sebuah sistem atau jaringan. OSSIM adalah gabungan dari IDS (Intrusion Detection System), vulnerability assessment, anomaly detection, network and availability detection, firewall, dll, yang dikemas dalam bentuk distro linux . Sehingga dalam penelitian ini melakukan uji coba serangan DDoS sekaligus melakukan monitoring DDoS di jaringan SDN dengan Alienvault Ossim.


Sign in / Sign up

Export Citation Format

Share Document