A study on pattern matching intrusion detection system for providing network security to improve the overall performance of security system

Author(s):  
Goje Roopa ◽  
M. Sampath Reddy
Author(s):  
Nitesh Singh Bhati ◽  
Manju Khari ◽  
Vicente García-Díaz ◽  
Elena Verdú

An Intrusion Detection System (IDS) is a network security system that detects, identifies, and tracks an intruder or an invader in a network. As the usage of the internet is growing every day in our society, the IDS is becoming an essential part of the network security system. Therefore, the proper research and implementation of IDSs are required. Today, with the help of improved technologies at our disposal, many solutions have been found to create many intrusion detection systems. However, it is difficult to identify the perfect solution from the vast options we have available. Hence, motivated by the need of a better security system, this paper presents a survey of different published solutions that have been developed and/or researched on the topic of intrusion detection techniques during the period from 2000 to 2019, including the accuracy of the output. With the help of this survey, an all-inclusive view of the different papers would be at one’s disposal.


2019 ◽  
Author(s):  
Mamay Syani

Cloud Computing merepresentasikan teknologi untuk menggunakan infrastruktur komputasi dengan cara yang lebih efisien, Di sisi lain, arsitektur yang rumit dan terdistribusi semacam itu menjadi target yang menarik bagi para penyusup Cyberattacks. Penelitian ini melakukan analisis dan membangun sistem keamanan jaringan infrastruktur Cloud computing pada studi kasus di sektor pendidikan. Infrastruktur dibangun berdasarkan kebutuhan pengguna yang diperoleh melalui metode wawancara. Metodologi penelitian yang digunakan yaitu metodologi NDLC yang terdiri dari 6 tahap namun dalam penelitian ini hanya memakai 5 tahapan dari metodologi NDLC. Hasil pengujian menunjukkan bahwa sistem keamanan jaringan yang dibangun sudah berhasil dan sistem Cloud yang bangun memenuhi user requirement. hasil uji terhadap kinerja sistem menunjukan bahwa pada parameter keakurasian pendeteksian bahwa sistem OSSEC dapat mendeteksi secara akurat dari serangan yang dilakukan penguji, pada parameter kecepatan pendeteksian bahwa sistem OSSEC lumayan cepat dalam mendeteksi adanya ancaman yang masuk, sedangkan pada parameter penggunaan sumber daya bahwa sistem OSSEC mengambil sedikit sekali penggunaan CPU dan RAM sehingga tidak memberatkan server, hasil observasi juga menunjukan bahwa sistem OSSEC yang dibangun berjalan dengan baik, berdasarkan dari observasi yang dilakukan oleh penulis hasil yang didapat terdapat sebanyak 620 peringatan pengintaian, 38849 peringatan authentication control, 569 peringatan attack/misue, 9018 peringatan Access Control, 0 peringatan Network Control, 230 peringatan System Monitor, dan 0 peringatan Policy Violation


2014 ◽  
Vol 602-605 ◽  
pp. 1526-1529
Author(s):  
Hai Yan Chen

With the popularization and development of Internet, the network has penetrated into every corner of social life. Network brings people convenient but at the same time it also brings a series of safety problems. Intrusion detection system is an important part of network security system. Computer security problem is increasingly prominent, which puts forward higher requirements on intrusion detection system. In this paper, the application of data mining and intelligent Agent detection in the intrusion detection system is researched.


2021 ◽  
Author(s):  
Farah Jemili ◽  
Hajer Bouras

In today’s world, Intrusion Detection System (IDS) is one of the significant tools used to the improvement of network security, by detecting attacks or abnormal data accesses. Most of existing IDS have many disadvantages such as high false alarm rates and low detection rates. For the IDS, dealing with distributed and massive data constitutes a challenge. Besides, dealing with imprecise data is another challenge. This paper proposes an Intrusion Detection System based on big data fuzzy analytics; Fuzzy C-Means (FCM) method is used to cluster and classify the pre-processed training dataset. The CTU-13 and the UNSW-NB15 are used as distributed and massive datasets to prove the feasibility of the method. The proposed system shows high performance in terms of accuracy, precision, detection rates, and false alarms.


2011 ◽  
Vol 48-49 ◽  
pp. 203-207 ◽  
Author(s):  
Ping Zhang ◽  
Jiang Hui Liu

This paper proposed a matching algorithm FBMH(Fast Boyer Moor Horspool),which made an improvement on the BMH(Boyer Moor Horspool) and BMHS(Boyer Moor Horspool Sundy) matching algorithm based on the study of several typical pattern matching algorithms used in intrusion detection. The result shows that, the FBMH algorithm has less intrusion detection matching time than BMH and BMHS algorithm. The FBMH algorithm accelerated the speed of pattern matching effectively, therefore enhanced the efficiency of the intrusion detection system.


Sign in / Sign up

Export Citation Format

Share Document