FIXIDS: A high-speed signature-based flow intrusion detection system

Author(s):  
Felix Erlacher ◽  
Falko Dressler
2012 ◽  
Vol 263-266 ◽  
pp. 2915-2919
Author(s):  
Gao Long Ma ◽  
Wen Tang

With the great increasing of high-speed networks,the traditional network intrusion detection system(NIDS) has a serious problem with handling heavy traffic loads in real-time ,which may result in packets loss and error detection . In this paper we will introduce the efficient load balancing scheme into NIDS and improve rule sets of the detection engine so as to make NIDS more suitable to high-speed networks environment.


2013 ◽  
Vol 760-762 ◽  
pp. 2010-2013
Author(s):  
Hui Qing Qiu ◽  
Cong Wang ◽  
Jie Lu

A technique of high-speed network intrusion detection system based on packet sampling theory is proposed. Starting with basic principles of packet sampling, this paper first analyses the significant mathematical conclusion of sampling strategies, then after discussing current strategies, mechanism and performance of different packet sampling methods, we specify an efficient strategy of packet sampling. Results show that this method can attain above 55% accurate rate with below 1% false rate in 94 specified attacking cases from DARPA 2000 IDS evaluation dataset.


2020 ◽  
Vol 5 (2) ◽  
Author(s):  
Lawrence B Adewole ◽  
Catherine R Adeyeye ◽  
Adebayo O Adetunmbi ◽  
Bosede A Ayogu ◽  
Olaiya Folorunsho

Increase in network traffic coupled with increasing adoption of end-to-end encryption of network packets are two major factors threatening the potency, or even the relevance, of packet-based intrusion detection techniques. Also, end-to-end encryption makes it nearly impossible for network and host-based intrusion detection system to analyze traffic for potential threats and intrusion, hence, the need for an alternative approach. Flow-based intrusion detection system has been proposed as an alternative to a packet-based intrusion detection system as it relies on information embedded in packet header and various statistical analyses of network flow for detecting intrusion.  This paper proposes packet header information abstraction model for intrusion detection on the UNSW-NB15 intrusion dataset. Four existing classification algorithms which include: Classification and Regression Tree (CART), Naïve Bayes (NB), K-Nearest Neighbour (KNN), and Support Vector Machine (SVM) are used to evaluate the degree of representativeness of the proposed model using accuracy, sensitivity and specificity evaluation metrics. An average accuracy of 97.95% was recorded across the four models with the minimum accuracy of 97.76 on SVM and best accuracy of  98.05% on CART while Sensitivity of 1.0 on both CART and NB shows that the model performs well in correctly identifying attacks in the network. The average specificity of 0.98 is also an indication of low false positive.  Results obtained show that the proposed abstraction model achieves high accuracy, sensitivity and specificity. The model can be used as filter on a high-speed network whereby packets flagged as an attack can be subjected to further analysis.Keywords—Data Abstraction, Data Mining,Flow-based, Intrusion detection, Network Security


Since all network vulnerabilities cannot be predicted and detected in advance and malicious intruders cannot prevent penetration into the system in any case, Intrusion Detection System (IDS) is essential to the security of a network system. Intrusion detection system technology based on mobile agents has been commonly utilized over the last several years to detect intrusion via the distributed network.Software agents are software components that run on the display device to aid, or take responsibility for, the purchase of physical information. These agents operate on the device's standard operating system and utilize low-level memory access requests from the Application Programming Interface (API) or use a specialized operating scheme for data acquisition. The system should be available and allow customized software to be executed for this strategy. A dedicated analyst interface agent presents the output of the multiagent detection layer to the operator which retrieves more detailed information to facilitate incident analysis. Our efficiency findings demonstrate the possibility to combine high speed hardware with the sophisticated agent software based on agents


Sign in / Sign up

Export Citation Format

Share Document