SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 246
A NOVEL DISTRIBUTED INTRUSION DETECTION FRAMEWORK
FOR NETWORK ANALYSIS
Rashmi MR1
, M Sudheep Elayidom2
, R VijayaKumar3
1
M.Tech Scholar, SOCS, M G University Kottayam, Kerala, India,rashmicusat@gmail.com
2
Associate Professor, CUSAT, Kochi, India, sudheepelayidom@hotmail.com
3
Professor, SOCS, MG University Kottayam, Kerala, India, vijayakumar@mgu.ac.in
Abstract
Computer networks are used to transfer information between different types of computer devices. Due to rapid development in
internet technologies, network users and communication increases day by day. Hence there is a need for huge data analysis, but a
currently available tool has been facing a bottleneck. The volume of data along with the speed it generates makes it difficult for
the current available tools to handle big data. To overcome this situation, big data packet analysis can be performed through a
cloud computing platform for distributed storage (HDFS) and distributed processing (map reduce). However, with the extensive
use of cloud computing, security issues arise. With increase of networks, security methods also need to be increased day by day.
Hence, intrusion detection system (IDS) are essential components in secure network environment monitors network traffic and
allows early detection attacks and alerts the system. Snort is most commonly used IDS available under GPL, which allows pattern
search. Hence, there is an urgent need to intelligent intrusion detection systems (IDSs) to detect intrusions automatically. The
functionality of Snort IDS can be extended by integrating anomaly preprocessor to detect new attacks. This paper provides a
novel distributed Intrusion detection framework for network analysis using snort and Hadoop.
Key Words: IDS, Snort, Big data, Hadoop, HDFS, Map Reduce and Anomaly preprocessor
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
When technology advances, computer network usage as
well as network crime increased.in other words, any attack
can be arrive from any node. Hence it is better to detect
early and subsequent actions should be taken to avoid
further attacks.
An intrusion detection system (IDS) is important
components in a secure network environment that monitors
network traffic that allows early identification and alerts the
system. IDS comprise of three fundamental components
Source, Analysis, and action. Information source can be
network based, host based or hybrid [3]. IDS comes under
two category misuse detection /signature based IDS (pre-
established one) and anomaly detection (newly launched
one).Misuse detection is based on knowledge of patterns
related with known attacks provided by human. Anomaly
detector generates profiles that represent normal data and
any deviation from these profiles can be considered as
attack. Statistical methods, expert system are some of the
methods for intrusion detection based on Anomaly
detection. It generates alert logs when a possible intrusion
occurs in the system [2][4].
2. BACKGROUNDS
2.1 Intrusion Detection Systems
Security attacks mainly falls under 2 classes: Active and
Passive. Attackers are hidden in case of active attacks and it
taps the communication link to collect data. Passive attacks
can be grouped into eavesdropping, node malfunctioning,
node destruction and traffic analysis types. In active attacks,
affects the operations in the attacked network and can be
detected. Active attacks can be grouped into Denial-of-
Service (DoS), jamming,hole attacks (black hole, wormhole,
sinkhole, etc.), flooding and Sybil types. Solutions to
security attacks involve three main components Prevention
(defense against attack),Detection (being aware of the attack
that is present) and Mitigation (reacting to the attack)[2].
Intrusion Detection Systems (IDSs) provide some or all of
the following data to the other systems: intruder identity,
intruder location, time, intrusion type, layer where it
effected. These data are very useful in mitigating .Hence,
intrusion detection systems are very important for network
security[2][4][3].
2.2 Snort
Snort is a free and open source network intrusion detection
and prevention system created by Martin Roesch in 1998. It
runs under three modes: a sniffing mode, a logging mode
and IDS mode. Sniffer modes read the network packets and
display them. Packet logger mode logs the network packets
to the disk. Network IDS is the most difficult mode. It
monitors network traffic and compare with a rule dataset
defined by the user and then perform a corresponding action
[5]. In intrusion detection mode, Snort does not capture
packet as it does in the network sniffer mode. If a packet
matches a rule, then only it is logged or an alert is generated,
else no log entry is created. A Snort-based IDS consists of
the following major components:
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 247
[1] Packet Decoder: The packet decoder collects packets
and sent to the detection engine.
Fig- 1: Components of Snort
[1] Preprocessors or Input Plug-ins: Preprocessors are
plugins used with Snort to modify packets before
detection engine.
[2] Detection Engine: It is the most important part of
Snort. It detect intrusion exists in any packets. It
employs Snort rules for this purpose. If a packet
matches any rule, appropriate action is taken;
otherwise the packet is dropped. Appropriate actions
may be logging the packet or generating alerts.
[3] Logging and Alerting System: It generates alert and
log messages
[4] Output Modules: Output modules process alerts and
logs[5].
Snort Rules:
The Snort programs are coded and implemented by Source
fire Inc. Snort system is installed in the Linux environment.
Then configure rules in snort.conf configuration files. The
rule syntax in Snort is well defined. Each rule consists of
two parts: rule Header composed of the 5 tuples such as
Action, Protocol Address, Port Direction, Address Port,
Keyword separator, argument, delimiter & rule options.
These rules consist of rules-head and rules-body, rule-head
is a rule action such as alert agreement, source IP, source
port, destination IP, and destination port. Rule bodies have
the alarm information and characteristics of string. The rules
are of the form ``cond -> action'', where action specifies the
action to be taken on a packet that matches the condition
cond[6]. Rules are usually placed in a configuration file
snort.conf[5].
Snort intrusion detection mode:
In the Network Intrusion Detection (NID) mode, it generates
alerts when a captured packet matches a rule. Snort can send
alerts in many modes. These modes are configurable
through the command line in snort.conf file. It reads its
configuration file /etc/syslog.conf where the location of
these log files is configured. The usual location of syslog
files is /var/log directory [6].
2.3 Hadoop
Hadoop is for Big Data Analysis. Hadoop is for analysing
peta bytes of data in a very short span of time. Hadoop is
basically a framework for running applications on large
clusters .It enables thousands of nodes to work together in
parallel for doing a single job. As the number of nodes
increases, the time taken to process the data
decreases[8][13].
The two important features of Hadoop are Distributed
Storage and Distributed processing. Distributed Storage is
given by Hadoop Distributed File System (HDFS) and
Distributed Processing is done by the concept known as
Map Reduce. A small Hadoop cluster will include a single
master and multiple worker nodes (slaves).The master node
consists of a Job Tracker, Task Tracker, Name Node and
Data Node. A slave or worker node acts as both a Data Node
and Task Tracker. Job Tracker and Task Trackers are
responsible for doing the map reduce jobs. Name nodes and
Data nodes are the part of the distributed file system[7].
Fig-2: Hadoop Master Slave Architecture
HDFS is a distributed, scalable, and portable file system
written in Java for the Hadoop framework. Files are divided
into large blocks and are distributed across the cluster.
Typical block size is 64 MB. Block sizes can be changed.
To handle failures, blocks will be replicated by appropriate
replication factor[7].
Fig- 3: HDFS
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 248
HDFS cluster is formed by a cluster of Data Nodes. A Name
Node performs various file system operation such close,
open rename etc. Name Node also manages block
replication. Data Nodes run operations such as read and
write that file system clients require. A file is divided into
more than a block that is stored in a Data Node and HDFS
determines mapping between Data Nodes and blocks. Map
Reduce is a software framework for writing applications
which process vast amounts of data in-parallel on large
clusters having thousands of nodes in a reliable, fault-
tolerant manner[7][10].
Fig- 4: Map Reduce
The Map Reduce engine which is placed above the file
system consists of one Job Tracker. Client applications
submit Map Reduce jobs to this Job Tracker. The Job
Tracker pushes work out to available Task Tracker[10]. One
of the most highlighted feature of Hadoop is that is rack-
aware. With rack-aware file system, the Job Tracker knows
which node contains the data, and which other machines are
nearby. If node fails, work is given to nodes in the same
rack. This reduces network traffic on the main backbone
network[10].
In the Map Reduce programming model used in Hadoop, the
computation takes a set of input key/value pairs, and
produces a set of out-put key/value pairs. Map and Reduce
are two basic functions in the Map Reduce computation[10].
Fig- 5: Map Reduce Key Value
3 EXISTING SYSTEM CHALLENGES
3.1 Problem Definition
The main aim of any IDS system is to effectively analyze all
packets passing throw the network without any packet
drops. The Internet traffic is rapidly increasing due to high-
speed and will continue to grow. The main limitation is to
deal with this huge amount of traffic data. However, there is
no any analysis tool that can afford this much amount of
data at once.
With the rapid development of the Internet, the network
security issues become more and more serious. Processor
speed growth has not kept up with the growth of the network
traffic and the rapid growth of network bandwidth. So it is
difficult to complete the analysis of the flow of hundreds of
megabytes by intrusion detection equipment, not to mention
on Gigabit network traffic. So network traffic is stored and
process in a cloud computing platform Hadoop. There are
several research works being done to impart better
performance to Snort & Hadoop [1][9][11].
3.2 Problem Solution
Hadoop for its scalability in storage and computing power is
a suitable platform for Internet traffic measurement and
analysis but brings about several research issues.[1][9] It
analyses the network data packet which contains intrusion
features with a high degree of regularity and extracts
abnormal flow characteristics, so it can effectively improve
the efficiency of intrusion detection. Finally, combine the
snort detection engine with the distributed programming
Map Reduce model, and make it suitable for concurrent
processing which can effectively respond to the massive
data packets in the high-speed network [11].Artificial
intelligence can be integrated to Snort to enhance its feature.
This improved Snort was able to differentiate between
normal traffic and malicious one.
3.3 Proposed System
In this work, the intrusion detection system Snort is made
use of. Snort is basically a Signature based IDS (detect only
known attack) which typically works on set of rules. The
incoming packets capture through snort packet logger mode
and stored as log files in local disk.in real life situation these
log files are of huge amount.so hadoop cloud computing
platform is used for big data analysis. After analysis these
packets are compared with the set of rules. If any of the
packets matches with the set of rules, actions specified in the
corresponding rules are performed [6]. The main
disadvantage of Signature based intrusion detection system
is that it is unable to identify unknown attacks. This kind of
intrusion detection systems work with rules. Therefore those
attacks those are not present as rule cannot be detected. Such
kind of attacks are identified by Anomaly based Intrusion
Detection Systems. Anomaly based ids, as the name
suggests typically works on any anomaly .i.e. any deviation
from the normal pattern is treated as anomaly and such
anomalies will be classified as attacks. Thus it will be able
to identify newly launched ones also. Anomaly preprocessor
is added to snort that extends functionality of snort. The
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 249
main disadvantage of this system is the generation of large
number of false attacks. However, high volumes of network
traffic requiring new approaches that are able to handle huge
volume of log and packet analysis [1][9] .
Fig-6: Proposed Architecture
Hadoop, an open-source computing platform of Map
Reduce and a distributed file system, has become a popular
infrastructure for massive data analytics because it facilitates
scalable data processing and storage services on a
distributed computing system consisting of commodity
hardware. The proposed architecture is able to efficiently
handle large volumes of collected data and consequent high
processing loads using Hadoop, Map Reduce and cloud
computing infrastructure [10]. The main focus of the paper
is to enhance the throughput and scalability of Log analysis
[13]. In this work, the packets captured by Snort are
analyzed by the Grid computing framework Hadoop, which
is used for Big Data Analysis. In this work, map
reduces[12] analyzed data stored at HDFS to generate the
count of the number of packets between any pair of nodes.
For those ip addresses that generate large number of
packets, Snort rules will be generated so that when the
number of packets from a particular source exceeds a
number, the node will generate alerts to other nodes since
there is a possibility of attack. Hadoop analyses the set of
packets and corresponding customized Snort rules are
generated if number of packets exceeds a count than the
normal one. By employing information provided by IDS, it
is possible to apply appropriate countermeasures and
mitigate attacks that would otherwise seriously undermine
network systems.
4 SYSTEM DESIGN
4.1 Data Flow Diagram
A Data Flow Diagram (DFD) is a graphical representation
of the "flow" of data through an information system,
modelling its process aspects. A DFD is often used as a
preliminary step to create an overview of the system
Fig-7: Overall Dataflow
5. IMPLEMENTATION
5.1 Log File Creation
Hping3 is used to generate packets of different format that
simulate flooding attacks. Hping3 commands used are as
follows: sudo hping3 --icmp --flood 192.168.1.1.The
incoming packets are capture through snort packet logger
mode and stored as log files in local disk. Different snort
commands are specified below: sudo snort -l /var/log/snort -
c /etc/snort/snort.conf -i wlan0(snort in IDS mode);(snort in
logger mode is as follow:sudo snort -ved -h 192.168.1.0/24 -
l /home/rashmi;) ls snort*;(to list log file
generated)command to convert to human readable form is
sudo snort -r snort.log.1427268044.The log files where then
converted into suitable readable format using snort
command or wireshark. Out of them source ip, destination
ip, source port, destination port, protocol and count where
extracted and converted to csv format using wireshark [6].
5.2 Packet Analysis using Hadoop
Snort rules generated after analysis is very much efficient in
detecting many attacks. To enhance the throughput and
scalability of log analysis cloud computing infrastructure
Hadoop is used[1][9][11].Hadoop cdh 4 is installed and
checked for wordcount program first. Default folders are set
for Hadoop input and output at HDFS. Before running
Hadoop Map reduce program written in java programming
language, log file generated are loaded into input folder in
csv format. Map reduce program use key as source ip,
destination ip and protocol; value obtained will be count of
packets from source.
Hive a data ware house is added to Hadoop for more user
friendliness.it uses HiveQL similar to Mysql .Some of Hive
query is mentioned below:
5.3 Snort Detection Engine
The new version of Snort uses an improved detection engine
for matching signatures[5]. Each incoming packet is
compared with snort rule database, if matches perform
action specified in rule. For those ip addresses that generate
large number of packets, Snort rules will be generated so
that when the number of packets from a particular source
exceeds a number, the node will generate alerts to other
nodes since there is a possibility of attack[6].
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 250
5.4 Snort with Anomaly Preprocessor
Anomaly based IDS collects incoming packets and a normal
profile is generated based on baseline that include variables
such as host memory or CPU usage, network packet types,
and packet quantities. Anomaly-based intrusion detection
triggers an alarm on the IDS when some type of unusual
behavior occurs on your network. Different methods such as
KNN classifier, naïve Bayes classifier, random forest
classifier and neural networks are used for this.
The advantage of the anomaly-based approach is that the
IDS can detect new types of attacks because it is looking for
abnormal activity of any type. Rule corresponding to new
attack is entered in snort database for further reference[6].
6. RESULTS
Map Reduce job was done on Hadoop cluster with various
file sizes and the CPU times consumed for each file size is
noted. The number of reduce tasks in all cases is one. As
shown in results the analysis process does not take much
time to perform the task.
Log File Size CPU time Spent
500 MB 54.123 s
800 MB 109.013 s
2 GB 150.231 s
2.7 GB 285.170 s
Table -1: Running With Various File Size
In Hive, the time for retrieving data is very less. During
implementation, the results of analysis were loaded to Hive.
The queries which included joins and aggregate functions are
carried out as Map Reduce jobs. Therefore it can be concluded
that managing data, with certain format is very much efficient
with Hive.
Hive query CPU time spent
Show tables 8.914 s
Create table 0.582 s
Load data 2.014 s
Select * from table 14.707 s
Select * from table for cond 19.547 s
Drop table 3.222 s
Table -2: Running with Various hive query
Anomaly based preprocessor with different methods are added
with snort to detect new anomalies and corresponding rule is
added to snort rule database for further reference. The
performance evaluations of these methods are done using
KDD CUP 99 dataset. Anomaly detection is done using naïve
Bayes classification algorithm and K-nearest neighbor
classifier with KDD 99 dataset with 494021 rows. Naive
Bayes classifier takes less time for prediction compared to K-
nearest neighbor algorithm for prediction .But the main
disadvantage of Naïve Bayes Classifier is less accuracy
compared to other methods such as K-nearest neighbor
classifier, Random forest Classifier and neural network
classifiers.
7. CONCLUSIONS AND FUTURE SCOPE
Security is the most crucial issue that is taking place. Large
amount of data has to be analyzed, for finding anomaly. A
user can customize its own rules even without analyzing.
But it will generate a lot of false alarms i.e. a node which is
not an attacker may be treated as an attack. Snort rules
generated after analysis is very much efficient in detecting
many attacks. In future the work can be extended to find
more attacks. For those ip addresses that send large number
of packets than normal ones, snort rules were generated. The
rules where generated by adding options for event filtering
in such a way that the alerts will be generated only if
number of packets from the particular source exceeds a
particular number. This is to avoid the number of false
alarms.
The importance of Internet traffic analysis, measurement,
and classification is demanding as the traffic data grows.
Still there are multiple issues to be considered like real time
traffic analysis; the research is going on the same. In future
machine learning algorithms integrated with Hadoop will
play an important role in traffic classification.AI is
integrated into Snort preprocessor plug-in, which makes
Snort IDS more intelligent to detect new or variant network
attacks. Future works includes, as for detection engineer of
Snort IDS, some evolutionary algorithms such as genetic
algorithm (GAs) or immune algorithms (IAs) approaches
can be combined with it.
Further techniques can be developed to minimize false
alarms. Study can be further extended to compare Snort with
more parameters such as false alarms, maintenance, firewall
etc. Even though our architecture still use off-line analysis
tool Hadoop, future work will consist in implementing the
same system with on-line analysis big data framework such
as Spark Streaming or Storm. The future work may
implement IPS to detect and prevent the threats against the
virtualized environment.
ACKNOWLEDGEMENT
We would like to thank all friends, faculties and students of
CUSAT and MG University who helped us in completing
this work.
REFERENCES
[1] Yeonhee Lee and Youngseok Lee, “Toward scalable
internet traffic measurement and analysis with Hadoop”.
ACMSIGCOMM Comput. Commun. Rev. 43 Issue 1,
Pages 5 – 13, January 2013.
[2] Hifaa Bait Baraka, Huaglory Tianfield,” Intrusion
Detection System for Cloud Environment”, 7th
International Conference on Security of Information and
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 251
Networks (SIN’14),IEEE 9-11 September 2014,
Glasgow.
[3] Manish Kumar, Dr. M. Hanumanthappa,” Scalable
Intrusion Detection Systems Log Analysis using Cloud
Computing Infrastructure”, 978-1-4799-1597-2/13/
IEEE feb 2013
[4] H.Debar, M. Dacier, and A. Wespi, “Towards a
taxonomy of Intrusion Detection Systems”, The
International Journal ofComputer and
Telecommunications Networking -Special issue on
computer network security, Volume 31 Issue 9, Pages
805 –822, April 1999,
[5] M. Roesch, Snort Lightweight Intrusion Detection for
Networks, USENIX LISA, 1999.
[6] j. Gomez, C. Gil , N. Padilla , R. Banos, C. Jimenez,
Design of a Snort-Based Hybrid Intrusion Detection
System, Proceedings of the 10th International Work-
Conference on Artificial Neural Networks, 2009,pp: 515-
522.
[7] Konstantin Shvachko, Hairong Kuang, Sanjay Radia,
and Robert Chansler, “The Hadoop Distributed File
System,” IEEE 26th
Symposium on Mass Storage
Systems and Technologies (MSST), pp.1-10, 2010.
[8] T. White, Hadoop: the Definitive Guide, O’Reilly, 3rd
ed., 2012
[9] Youngseok Lee; Wonchul Kang; Hyeongu Son, "An
Internet traffic analysis method with MapReduce,"
Network Operations and Management Symposium
Workshops (NOMS Wksps), 2010 IEEE/IFIP , vol., no.,
pp.357,361, 19-23 April 2010.
[10]J. Dean and S. Ghemawat, “MapReduce: Simplified
Data Processing on Large Cluster”, OSDI'04
Proceedings of the 6th
conference on Symposium on
Opearting Systems Design & Implementation - Volume
6, Pages 10-10 ,USENIX,2004.
[11]Y. Lee, W. Kang, and Y. Lee, A Hadoop-based Packet
Trace Processing Tool, International Workshop on
Traffic Monitoring and Analysis (TMA 2011),
April2011.
[12] http://www.sthurlow.com/python
[13] http://hadoop.apache.org/ (Accessed: 8 October 2013).
BIOGRAPHIES
Rashmi MR is an M.Tech scholar in
School of Computer Sciences under M.G
University of Kerala. She has Received
B.Tech degree in Computer Engineering
from SOE kalamassery under CUSAT
University of Kerala. Her research
interest includes Distributed Computing and Networking.
Dr. M Sudheep Elayidom is working as
Associate Professor in the Department of
Computer Science, SOE, CUSAT, and
Kochi, India. He completed his PhD from
CUSAT. His specialization is in Cloud
Computing And Data Mining. He has
published many research papers in National, International
Conferences and Journals.
Dr. R VijayaKumar is working as
Professor in SOCS, MG University. He
completed his PhD from IIT Bombay. His
specialization is in artificial intelligence
and wireless communication. He has
published many research papers in
National, International Conferences and Journals.

More Related Content

What's hot

Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...eSAT Journals
 
D03601023026
D03601023026D03601023026
D03601023026theijes
 
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...IRJET Journal
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Editor IJARCET
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPCSCJournals
 
IRJET- Cloud based Deduplication using Middleware Approach
IRJET- Cloud based Deduplication using Middleware ApproachIRJET- Cloud based Deduplication using Middleware Approach
IRJET- Cloud based Deduplication using Middleware ApproachIRJET Journal
 
Review and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingReview and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingIRJET Journal
 
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey:  Enhanced Block Level Message Locked Encryption for data DeduplicationA Survey:  Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data DeduplicationIRJET Journal
 
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...IRJET Journal
 
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...ijtsrd
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor NetworksReview for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor NetworksIRJET Journal
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...eSAT Journals
 
Secure signature based cedar routing in mobile adhoc networks
Secure signature based cedar routing in mobile adhoc networksSecure signature based cedar routing in mobile adhoc networks
Secure signature based cedar routing in mobile adhoc networkseSAT Journals
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
 
Hiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmissionHiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmissioneSAT Journals
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
 
Secure retrieval of files using homomorphic encryption for cloud computing
Secure retrieval of files using homomorphic encryption for cloud computingSecure retrieval of files using homomorphic encryption for cloud computing
Secure retrieval of files using homomorphic encryption for cloud computingeSAT Publishing House
 

What's hot (20)

Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
 
D03601023026
D03601023026D03601023026
D03601023026
 
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISP
 
IRJET- Cloud based Deduplication using Middleware Approach
IRJET- Cloud based Deduplication using Middleware ApproachIRJET- Cloud based Deduplication using Middleware Approach
IRJET- Cloud based Deduplication using Middleware Approach
 
Review and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingReview and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud Computing
 
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey:  Enhanced Block Level Message Locked Encryption for data DeduplicationA Survey:  Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
 
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
 
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
 
1426742816
14267428161426742816
1426742816
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor NetworksReview for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor Networks
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...
 
Secure signature based cedar routing in mobile adhoc networks
Secure signature based cedar routing in mobile adhoc networksSecure signature based cedar routing in mobile adhoc networks
Secure signature based cedar routing in mobile adhoc networks
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
Hiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmissionHiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmission
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiency
 
Secure retrieval of files using homomorphic encryption for cloud computing
Secure retrieval of files using homomorphic encryption for cloud computingSecure retrieval of files using homomorphic encryption for cloud computing
Secure retrieval of files using homomorphic encryption for cloud computing
 

Similar to A novel distributed intrusion detection framework for network analysis

EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...IJNSA Journal
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingIRJET Journal
 
Defense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningDefense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningeSAT Journals
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningeSAT Publishing House
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmeSAT Publishing House
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmeSAT Journals
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...IJMER
 
An analysis of Network Intrusion Detection System using SNORT
An analysis of Network Intrusion Detection System using SNORTAn analysis of Network Intrusion Detection System using SNORT
An analysis of Network Intrusion Detection System using SNORTijsrd.com
 
Modern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent HoneypotModern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent HoneypotIRJET Journal
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...eSAT Journals
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...eSAT Publishing House
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyeSAT Publishing House
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETIRJET Journal
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...eSAT Publishing House
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla SahiSilvaGraf83
 

Similar to A novel distributed intrusion detection framework for network analysis (20)

EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
 
Defense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningDefense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learning
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learning
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
 
An analysis of Network Intrusion Detection System using SNORT
An analysis of Network Intrusion Detection System using SNORTAn analysis of Network Intrusion Detection System using SNORT
An analysis of Network Intrusion Detection System using SNORT
 
Modern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent HoneypotModern Attack Detection using Intelligent Honeypot
Modern Attack Detection using Intelligent Honeypot
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a survey
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANET
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla Sahi
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 

Recently uploaded (20)

Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 

A novel distributed intrusion detection framework for network analysis

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 246 A NOVEL DISTRIBUTED INTRUSION DETECTION FRAMEWORK FOR NETWORK ANALYSIS Rashmi MR1 , M Sudheep Elayidom2 , R VijayaKumar3 1 M.Tech Scholar, SOCS, M G University Kottayam, Kerala, India,rashmicusat@gmail.com 2 Associate Professor, CUSAT, Kochi, India, sudheepelayidom@hotmail.com 3 Professor, SOCS, MG University Kottayam, Kerala, India, vijayakumar@mgu.ac.in Abstract Computer networks are used to transfer information between different types of computer devices. Due to rapid development in internet technologies, network users and communication increases day by day. Hence there is a need for huge data analysis, but a currently available tool has been facing a bottleneck. The volume of data along with the speed it generates makes it difficult for the current available tools to handle big data. To overcome this situation, big data packet analysis can be performed through a cloud computing platform for distributed storage (HDFS) and distributed processing (map reduce). However, with the extensive use of cloud computing, security issues arise. With increase of networks, security methods also need to be increased day by day. Hence, intrusion detection system (IDS) are essential components in secure network environment monitors network traffic and allows early detection attacks and alerts the system. Snort is most commonly used IDS available under GPL, which allows pattern search. Hence, there is an urgent need to intelligent intrusion detection systems (IDSs) to detect intrusions automatically. The functionality of Snort IDS can be extended by integrating anomaly preprocessor to detect new attacks. This paper provides a novel distributed Intrusion detection framework for network analysis using snort and Hadoop. Key Words: IDS, Snort, Big data, Hadoop, HDFS, Map Reduce and Anomaly preprocessor --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION When technology advances, computer network usage as well as network crime increased.in other words, any attack can be arrive from any node. Hence it is better to detect early and subsequent actions should be taken to avoid further attacks. An intrusion detection system (IDS) is important components in a secure network environment that monitors network traffic that allows early identification and alerts the system. IDS comprise of three fundamental components Source, Analysis, and action. Information source can be network based, host based or hybrid [3]. IDS comes under two category misuse detection /signature based IDS (pre- established one) and anomaly detection (newly launched one).Misuse detection is based on knowledge of patterns related with known attacks provided by human. Anomaly detector generates profiles that represent normal data and any deviation from these profiles can be considered as attack. Statistical methods, expert system are some of the methods for intrusion detection based on Anomaly detection. It generates alert logs when a possible intrusion occurs in the system [2][4]. 2. BACKGROUNDS 2.1 Intrusion Detection Systems Security attacks mainly falls under 2 classes: Active and Passive. Attackers are hidden in case of active attacks and it taps the communication link to collect data. Passive attacks can be grouped into eavesdropping, node malfunctioning, node destruction and traffic analysis types. In active attacks, affects the operations in the attacked network and can be detected. Active attacks can be grouped into Denial-of- Service (DoS), jamming,hole attacks (black hole, wormhole, sinkhole, etc.), flooding and Sybil types. Solutions to security attacks involve three main components Prevention (defense against attack),Detection (being aware of the attack that is present) and Mitigation (reacting to the attack)[2]. Intrusion Detection Systems (IDSs) provide some or all of the following data to the other systems: intruder identity, intruder location, time, intrusion type, layer where it effected. These data are very useful in mitigating .Hence, intrusion detection systems are very important for network security[2][4][3]. 2.2 Snort Snort is a free and open source network intrusion detection and prevention system created by Martin Roesch in 1998. It runs under three modes: a sniffing mode, a logging mode and IDS mode. Sniffer modes read the network packets and display them. Packet logger mode logs the network packets to the disk. Network IDS is the most difficult mode. It monitors network traffic and compare with a rule dataset defined by the user and then perform a corresponding action [5]. In intrusion detection mode, Snort does not capture packet as it does in the network sniffer mode. If a packet matches a rule, then only it is logged or an alert is generated, else no log entry is created. A Snort-based IDS consists of the following major components:
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 247 [1] Packet Decoder: The packet decoder collects packets and sent to the detection engine. Fig- 1: Components of Snort [1] Preprocessors or Input Plug-ins: Preprocessors are plugins used with Snort to modify packets before detection engine. [2] Detection Engine: It is the most important part of Snort. It detect intrusion exists in any packets. It employs Snort rules for this purpose. If a packet matches any rule, appropriate action is taken; otherwise the packet is dropped. Appropriate actions may be logging the packet or generating alerts. [3] Logging and Alerting System: It generates alert and log messages [4] Output Modules: Output modules process alerts and logs[5]. Snort Rules: The Snort programs are coded and implemented by Source fire Inc. Snort system is installed in the Linux environment. Then configure rules in snort.conf configuration files. The rule syntax in Snort is well defined. Each rule consists of two parts: rule Header composed of the 5 tuples such as Action, Protocol Address, Port Direction, Address Port, Keyword separator, argument, delimiter & rule options. These rules consist of rules-head and rules-body, rule-head is a rule action such as alert agreement, source IP, source port, destination IP, and destination port. Rule bodies have the alarm information and characteristics of string. The rules are of the form ``cond -> action'', where action specifies the action to be taken on a packet that matches the condition cond[6]. Rules are usually placed in a configuration file snort.conf[5]. Snort intrusion detection mode: In the Network Intrusion Detection (NID) mode, it generates alerts when a captured packet matches a rule. Snort can send alerts in many modes. These modes are configurable through the command line in snort.conf file. It reads its configuration file /etc/syslog.conf where the location of these log files is configured. The usual location of syslog files is /var/log directory [6]. 2.3 Hadoop Hadoop is for Big Data Analysis. Hadoop is for analysing peta bytes of data in a very short span of time. Hadoop is basically a framework for running applications on large clusters .It enables thousands of nodes to work together in parallel for doing a single job. As the number of nodes increases, the time taken to process the data decreases[8][13]. The two important features of Hadoop are Distributed Storage and Distributed processing. Distributed Storage is given by Hadoop Distributed File System (HDFS) and Distributed Processing is done by the concept known as Map Reduce. A small Hadoop cluster will include a single master and multiple worker nodes (slaves).The master node consists of a Job Tracker, Task Tracker, Name Node and Data Node. A slave or worker node acts as both a Data Node and Task Tracker. Job Tracker and Task Trackers are responsible for doing the map reduce jobs. Name nodes and Data nodes are the part of the distributed file system[7]. Fig-2: Hadoop Master Slave Architecture HDFS is a distributed, scalable, and portable file system written in Java for the Hadoop framework. Files are divided into large blocks and are distributed across the cluster. Typical block size is 64 MB. Block sizes can be changed. To handle failures, blocks will be replicated by appropriate replication factor[7]. Fig- 3: HDFS
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 248 HDFS cluster is formed by a cluster of Data Nodes. A Name Node performs various file system operation such close, open rename etc. Name Node also manages block replication. Data Nodes run operations such as read and write that file system clients require. A file is divided into more than a block that is stored in a Data Node and HDFS determines mapping between Data Nodes and blocks. Map Reduce is a software framework for writing applications which process vast amounts of data in-parallel on large clusters having thousands of nodes in a reliable, fault- tolerant manner[7][10]. Fig- 4: Map Reduce The Map Reduce engine which is placed above the file system consists of one Job Tracker. Client applications submit Map Reduce jobs to this Job Tracker. The Job Tracker pushes work out to available Task Tracker[10]. One of the most highlighted feature of Hadoop is that is rack- aware. With rack-aware file system, the Job Tracker knows which node contains the data, and which other machines are nearby. If node fails, work is given to nodes in the same rack. This reduces network traffic on the main backbone network[10]. In the Map Reduce programming model used in Hadoop, the computation takes a set of input key/value pairs, and produces a set of out-put key/value pairs. Map and Reduce are two basic functions in the Map Reduce computation[10]. Fig- 5: Map Reduce Key Value 3 EXISTING SYSTEM CHALLENGES 3.1 Problem Definition The main aim of any IDS system is to effectively analyze all packets passing throw the network without any packet drops. The Internet traffic is rapidly increasing due to high- speed and will continue to grow. The main limitation is to deal with this huge amount of traffic data. However, there is no any analysis tool that can afford this much amount of data at once. With the rapid development of the Internet, the network security issues become more and more serious. Processor speed growth has not kept up with the growth of the network traffic and the rapid growth of network bandwidth. So it is difficult to complete the analysis of the flow of hundreds of megabytes by intrusion detection equipment, not to mention on Gigabit network traffic. So network traffic is stored and process in a cloud computing platform Hadoop. There are several research works being done to impart better performance to Snort & Hadoop [1][9][11]. 3.2 Problem Solution Hadoop for its scalability in storage and computing power is a suitable platform for Internet traffic measurement and analysis but brings about several research issues.[1][9] It analyses the network data packet which contains intrusion features with a high degree of regularity and extracts abnormal flow characteristics, so it can effectively improve the efficiency of intrusion detection. Finally, combine the snort detection engine with the distributed programming Map Reduce model, and make it suitable for concurrent processing which can effectively respond to the massive data packets in the high-speed network [11].Artificial intelligence can be integrated to Snort to enhance its feature. This improved Snort was able to differentiate between normal traffic and malicious one. 3.3 Proposed System In this work, the intrusion detection system Snort is made use of. Snort is basically a Signature based IDS (detect only known attack) which typically works on set of rules. The incoming packets capture through snort packet logger mode and stored as log files in local disk.in real life situation these log files are of huge amount.so hadoop cloud computing platform is used for big data analysis. After analysis these packets are compared with the set of rules. If any of the packets matches with the set of rules, actions specified in the corresponding rules are performed [6]. The main disadvantage of Signature based intrusion detection system is that it is unable to identify unknown attacks. This kind of intrusion detection systems work with rules. Therefore those attacks those are not present as rule cannot be detected. Such kind of attacks are identified by Anomaly based Intrusion Detection Systems. Anomaly based ids, as the name suggests typically works on any anomaly .i.e. any deviation from the normal pattern is treated as anomaly and such anomalies will be classified as attacks. Thus it will be able to identify newly launched ones also. Anomaly preprocessor is added to snort that extends functionality of snort. The
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 249 main disadvantage of this system is the generation of large number of false attacks. However, high volumes of network traffic requiring new approaches that are able to handle huge volume of log and packet analysis [1][9] . Fig-6: Proposed Architecture Hadoop, an open-source computing platform of Map Reduce and a distributed file system, has become a popular infrastructure for massive data analytics because it facilitates scalable data processing and storage services on a distributed computing system consisting of commodity hardware. The proposed architecture is able to efficiently handle large volumes of collected data and consequent high processing loads using Hadoop, Map Reduce and cloud computing infrastructure [10]. The main focus of the paper is to enhance the throughput and scalability of Log analysis [13]. In this work, the packets captured by Snort are analyzed by the Grid computing framework Hadoop, which is used for Big Data Analysis. In this work, map reduces[12] analyzed data stored at HDFS to generate the count of the number of packets between any pair of nodes. For those ip addresses that generate large number of packets, Snort rules will be generated so that when the number of packets from a particular source exceeds a number, the node will generate alerts to other nodes since there is a possibility of attack. Hadoop analyses the set of packets and corresponding customized Snort rules are generated if number of packets exceeds a count than the normal one. By employing information provided by IDS, it is possible to apply appropriate countermeasures and mitigate attacks that would otherwise seriously undermine network systems. 4 SYSTEM DESIGN 4.1 Data Flow Diagram A Data Flow Diagram (DFD) is a graphical representation of the "flow" of data through an information system, modelling its process aspects. A DFD is often used as a preliminary step to create an overview of the system Fig-7: Overall Dataflow 5. IMPLEMENTATION 5.1 Log File Creation Hping3 is used to generate packets of different format that simulate flooding attacks. Hping3 commands used are as follows: sudo hping3 --icmp --flood 192.168.1.1.The incoming packets are capture through snort packet logger mode and stored as log files in local disk. Different snort commands are specified below: sudo snort -l /var/log/snort - c /etc/snort/snort.conf -i wlan0(snort in IDS mode);(snort in logger mode is as follow:sudo snort -ved -h 192.168.1.0/24 - l /home/rashmi;) ls snort*;(to list log file generated)command to convert to human readable form is sudo snort -r snort.log.1427268044.The log files where then converted into suitable readable format using snort command or wireshark. Out of them source ip, destination ip, source port, destination port, protocol and count where extracted and converted to csv format using wireshark [6]. 5.2 Packet Analysis using Hadoop Snort rules generated after analysis is very much efficient in detecting many attacks. To enhance the throughput and scalability of log analysis cloud computing infrastructure Hadoop is used[1][9][11].Hadoop cdh 4 is installed and checked for wordcount program first. Default folders are set for Hadoop input and output at HDFS. Before running Hadoop Map reduce program written in java programming language, log file generated are loaded into input folder in csv format. Map reduce program use key as source ip, destination ip and protocol; value obtained will be count of packets from source. Hive a data ware house is added to Hadoop for more user friendliness.it uses HiveQL similar to Mysql .Some of Hive query is mentioned below: 5.3 Snort Detection Engine The new version of Snort uses an improved detection engine for matching signatures[5]. Each incoming packet is compared with snort rule database, if matches perform action specified in rule. For those ip addresses that generate large number of packets, Snort rules will be generated so that when the number of packets from a particular source exceeds a number, the node will generate alerts to other nodes since there is a possibility of attack[6].
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 250 5.4 Snort with Anomaly Preprocessor Anomaly based IDS collects incoming packets and a normal profile is generated based on baseline that include variables such as host memory or CPU usage, network packet types, and packet quantities. Anomaly-based intrusion detection triggers an alarm on the IDS when some type of unusual behavior occurs on your network. Different methods such as KNN classifier, naïve Bayes classifier, random forest classifier and neural networks are used for this. The advantage of the anomaly-based approach is that the IDS can detect new types of attacks because it is looking for abnormal activity of any type. Rule corresponding to new attack is entered in snort database for further reference[6]. 6. RESULTS Map Reduce job was done on Hadoop cluster with various file sizes and the CPU times consumed for each file size is noted. The number of reduce tasks in all cases is one. As shown in results the analysis process does not take much time to perform the task. Log File Size CPU time Spent 500 MB 54.123 s 800 MB 109.013 s 2 GB 150.231 s 2.7 GB 285.170 s Table -1: Running With Various File Size In Hive, the time for retrieving data is very less. During implementation, the results of analysis were loaded to Hive. The queries which included joins and aggregate functions are carried out as Map Reduce jobs. Therefore it can be concluded that managing data, with certain format is very much efficient with Hive. Hive query CPU time spent Show tables 8.914 s Create table 0.582 s Load data 2.014 s Select * from table 14.707 s Select * from table for cond 19.547 s Drop table 3.222 s Table -2: Running with Various hive query Anomaly based preprocessor with different methods are added with snort to detect new anomalies and corresponding rule is added to snort rule database for further reference. The performance evaluations of these methods are done using KDD CUP 99 dataset. Anomaly detection is done using naïve Bayes classification algorithm and K-nearest neighbor classifier with KDD 99 dataset with 494021 rows. Naive Bayes classifier takes less time for prediction compared to K- nearest neighbor algorithm for prediction .But the main disadvantage of Naïve Bayes Classifier is less accuracy compared to other methods such as K-nearest neighbor classifier, Random forest Classifier and neural network classifiers. 7. CONCLUSIONS AND FUTURE SCOPE Security is the most crucial issue that is taking place. Large amount of data has to be analyzed, for finding anomaly. A user can customize its own rules even without analyzing. But it will generate a lot of false alarms i.e. a node which is not an attacker may be treated as an attack. Snort rules generated after analysis is very much efficient in detecting many attacks. In future the work can be extended to find more attacks. For those ip addresses that send large number of packets than normal ones, snort rules were generated. The rules where generated by adding options for event filtering in such a way that the alerts will be generated only if number of packets from the particular source exceeds a particular number. This is to avoid the number of false alarms. The importance of Internet traffic analysis, measurement, and classification is demanding as the traffic data grows. Still there are multiple issues to be considered like real time traffic analysis; the research is going on the same. In future machine learning algorithms integrated with Hadoop will play an important role in traffic classification.AI is integrated into Snort preprocessor plug-in, which makes Snort IDS more intelligent to detect new or variant network attacks. Future works includes, as for detection engineer of Snort IDS, some evolutionary algorithms such as genetic algorithm (GAs) or immune algorithms (IAs) approaches can be combined with it. Further techniques can be developed to minimize false alarms. Study can be further extended to compare Snort with more parameters such as false alarms, maintenance, firewall etc. Even though our architecture still use off-line analysis tool Hadoop, future work will consist in implementing the same system with on-line analysis big data framework such as Spark Streaming or Storm. The future work may implement IPS to detect and prevent the threats against the virtualized environment. ACKNOWLEDGEMENT We would like to thank all friends, faculties and students of CUSAT and MG University who helped us in completing this work. REFERENCES [1] Yeonhee Lee and Youngseok Lee, “Toward scalable internet traffic measurement and analysis with Hadoop”. ACMSIGCOMM Comput. Commun. Rev. 43 Issue 1, Pages 5 – 13, January 2013. [2] Hifaa Bait Baraka, Huaglory Tianfield,” Intrusion Detection System for Cloud Environment”, 7th International Conference on Security of Information and
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 251 Networks (SIN’14),IEEE 9-11 September 2014, Glasgow. [3] Manish Kumar, Dr. M. Hanumanthappa,” Scalable Intrusion Detection Systems Log Analysis using Cloud Computing Infrastructure”, 978-1-4799-1597-2/13/ IEEE feb 2013 [4] H.Debar, M. Dacier, and A. Wespi, “Towards a taxonomy of Intrusion Detection Systems”, The International Journal ofComputer and Telecommunications Networking -Special issue on computer network security, Volume 31 Issue 9, Pages 805 –822, April 1999, [5] M. Roesch, Snort Lightweight Intrusion Detection for Networks, USENIX LISA, 1999. [6] j. Gomez, C. Gil , N. Padilla , R. Banos, C. Jimenez, Design of a Snort-Based Hybrid Intrusion Detection System, Proceedings of the 10th International Work- Conference on Artificial Neural Networks, 2009,pp: 515- 522. [7] Konstantin Shvachko, Hairong Kuang, Sanjay Radia, and Robert Chansler, “The Hadoop Distributed File System,” IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp.1-10, 2010. [8] T. White, Hadoop: the Definitive Guide, O’Reilly, 3rd ed., 2012 [9] Youngseok Lee; Wonchul Kang; Hyeongu Son, "An Internet traffic analysis method with MapReduce," Network Operations and Management Symposium Workshops (NOMS Wksps), 2010 IEEE/IFIP , vol., no., pp.357,361, 19-23 April 2010. [10]J. Dean and S. Ghemawat, “MapReduce: Simplified Data Processing on Large Cluster”, OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6, Pages 10-10 ,USENIX,2004. [11]Y. Lee, W. Kang, and Y. Lee, A Hadoop-based Packet Trace Processing Tool, International Workshop on Traffic Monitoring and Analysis (TMA 2011), April2011. [12] http://www.sthurlow.com/python [13] http://hadoop.apache.org/ (Accessed: 8 October 2013). BIOGRAPHIES Rashmi MR is an M.Tech scholar in School of Computer Sciences under M.G University of Kerala. She has Received B.Tech degree in Computer Engineering from SOE kalamassery under CUSAT University of Kerala. Her research interest includes Distributed Computing and Networking. Dr. M Sudheep Elayidom is working as Associate Professor in the Department of Computer Science, SOE, CUSAT, and Kochi, India. He completed his PhD from CUSAT. His specialization is in Cloud Computing And Data Mining. He has published many research papers in National, International Conferences and Journals. Dr. R VijayaKumar is working as Professor in SOCS, MG University. He completed his PhD from IIT Bombay. His specialization is in artificial intelligence and wireless communication. He has published many research papers in National, International Conferences and Journals.