scholarly journals Comparative Analysis of Architectures for Intrusion Detection Systems against DoS Attacks in MANETs based on Chi-Square Test

2014 ◽  
Vol 87 (4) ◽  
pp. 27-33
Author(s):  
A. AnnaLakshmi ◽  
S. Anandkumar ◽  
G. Nagarajan ◽  
K. R. Valluvan
2021 ◽  
Vol 104 ◽  
pp. 102219
Author(s):  
George Simoglou ◽  
George Violettas ◽  
Sophia Petridou ◽  
Lefteris Mamatas

Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 916 ◽  
Author(s):  
Jiyeon Kim ◽  
Jiwon Kim ◽  
Hyunjung Kim ◽  
Minsun Shim ◽  
Eunjung Choi

As cyberattacks become more intelligent, it is challenging to detect advanced attacks in a variety of fields including industry, national defense, and healthcare. Traditional intrusion detection systems are no longer enough to detect these advanced attacks with unexpected patterns. Attackers bypass known signatures and pretend to be normal users. Deep learning is an alternative to solving these issues. Deep Learning (DL)-based intrusion detection does not require a lot of attack signatures or the list of normal behaviors to generate detection rules. DL defines intrusion features by itself through training empirical data. We develop a DL-based intrusion model especially focusing on denial of service (DoS) attacks. For the intrusion dataset, we use KDD CUP 1999 dataset (KDD), the most widely used dataset for the evaluation of intrusion detection systems (IDS). KDD consists of four types of attack categories, such as DoS, user to root (U2R), remote to local (R2L), and probing. Numerous KDD studies have been employing machine learning and classifying the dataset into the four categories or into two categories such as attack and benign. Rather than focusing on the broad categories, we focus on various attacks belonging to same category. Unlike other categories of KDD, the DoS category has enough samples for training each attack. In addition to KDD, we use CSE-CIC-IDS2018 which is the most up-to-date IDS dataset. CSE-CIC-IDS2018 consists of more advanced DoS attacks than that of KDD. In this work, we focus on the DoS category of both datasets and develop a DL model for DoS detection. We develop our model based on a Convolutional Neural Network (CNN) and evaluate its performance through comparison with an Recurrent Neural Network (RNN). Furthermore, we suggest the optimal CNN design for the better performance through numerous experiments.


Author(s):  
Sourav Dutta ◽  
Arnab Bhattacharya

With the tremendous expansion of reservoirs of sequence data stored worldwide, efficient mining of large string databases in various domains including intrusion detection systems, player statistics, texts, and proteins, has emerged as a practical challenge. Searching for an unusual pattern within long strings of data is one of the foremost requirements for many diverse applications. Given a string, the problem is to identify the substrings that differ the most from the expected or normal behavior, i.e., the substrings that are statistically significant (or, in other words, less likely to occur due to chance alone). We first survey and analyze the different statistical measures available to meet this end. Next, we argue that the most appropriate metric is the chi-square measure. Finally, we discuss different approaches and algorithms proposed for retrieving the top-k substrings with the largest chi-square measure.


2010 ◽  
Vol 4 (1) ◽  
pp. 18-31
Author(s):  
Ran Tao ◽  
Li Yang ◽  
Lu Peng ◽  
Bin Li

Application features like port numbers are used by Network-based Intrusion Detection Systems (NIDSs) to detect attacks coming from networks. System calls and the operating system related information are used by Host-based Intrusion Detection Systems (HIDSs) to detect intrusions toward a host. However, the relationship between hardware architecture events and Denial-of-Service (DoS) attacks has not been well revealed. When increasingly sophisticated intrusions emerge, some attacks are able to bypass both the application and the operating system level feature monitors. Therefore, a more effective solution is required to enhance existing HIDSs. In this article, the authors identify the following hardware architecture features: Instruction Count, Cache Miss, Bus Traffic and integrate them into a HIDS framework based on a modern statistical Gradient Boosting Trees model. Through the integration of application, operating system and architecture level features, the proposed HIDS demonstrates a significant improvement of the detection rate in terms of sophisticated DoS intrusions.


Author(s):  
Riya Bilaiya ◽  
Priyanka Ahlawat ◽  
Rohit Bathla

The community is moving towards the cloud, and its security is important. An old vulnerability known by the attacker can be easily exploited. Security issues and intruders can be identified by the IDS (intrusion detection systems). Some of the solutions consist of network firewall, anti-malware. Malicious entities and fake traffic are detected through packet sniffing. This chapter surveys different approaches for IDS, compares them, and presents a comparative analysis based on their merits and demerits. The authors aim to present an exhaustive survey of current trends in IDS research along with some future challenges that are likely to be explored. They also discuss the implementation details of IDS with parameters used to evaluate their performance.


Sign in / Sign up

Export Citation Format

Share Document