SlideShare a Scribd company logo
Intrusion Detection System:
Facts, Challenges and Futures

                    By Gina Tjhai
                 13th March 2007
         Network Research Group



                                1
Overview
• Introduction
• Challenges of current IDS
• Potential solutions
• Alarm Correlation
• Existing methods of Alarm
  Correlation
• Future IDS developments

                              2
Introduction
What is actually Intrusion Detection System
  (IDS)?
• A component of computer and network
  infrastructure which is aimed at detecting
  attacks against computer systems and
  networks, or information system.
IDS implementation:
• As a hardware installed on the network
• Or as an agent on an existing piece of
  hardware that is connected to the network.
                                           3
Introduction
Component of IDS
  – Information Collection
  – Detection
  – Response
Parameters of IDS
  – Accuracy
  – Performance
  – Completeness

                             4
Introduction
IDS Classification
•   Sources
      • Application-based
      • Host-based
      • Network-based
      • Hybrid
•   Detection Mechanism
      • Misuse detection
      • Anomaly based
      • Hybrid
•   Response
      • Active
      • Passive             5
Challenges of IDS
• Runtime limitations
• Specification of detection signatures
• Dependency on environment

High rate of false alarms – the limiting
  factor for the performance of an
  intrusion detection system
Is fine-tuning effective?
                                           6
Potential Solutions
• Data mining
  The creation of complex database which is used
    to record data related to specific activities.
    Through the data generated, a pattern or
    model will be developed by knowledge seeker
    based on the accumulated data processed by
    the algorithm implemented on the front end
    application.
• Examples:
  – Applying the concept of root cause (“the reason for
    which alerts occur”) (Dain and Cunningham 2001)
  – Sequential pattern mining and episode rules (Lee and
    Stolfo 2000)
                                                           7
Potential Solutions
• Machine learning technique
  Referring to a system capable of the
   autonomous acquisition and integration
   of knowledge
• Example:
  – Alert Classification    true positives and
    false positive (Pietraszek 2004)



                                             8
Potential Solutions
• Co-simulation mechanism (based on
  a biological immune mechanism)
  (Qiao and Weixin 2002)
  – Integrating the misuse detection
    technique with the anomaly detection
    technique
  – Applying a co-stimulation mechanism


Alarm Correlation
                                           9
Alert Correlation
“Correlating alarms”: combining the
  fragmented information contained in the
  alert sequences and interpreting the
  whole flow of alerts
Functional requirements:
• Modifying alarms
• Suppressing alarms
• Clearing active alarms
• Generating new alarms
• Delaying alarms
                                            10
Existing methods of Alarm Correlation
• Correlating alerts based on the prerequisites
  of intrusion    providing a high level of
  representation of the correlated alerts, and thus
  reveals the structure of series of attacks. (Ning et
  al. 2001)

• Correlating alerts based on the similarities
  between alert features     grouping alerts into
  scenario depending on the number of matching
  attributes from the most general to the most
  specific cases. (Debar and Wespi 2001)


                                                     11
Existing methods of Alarm Correlation
• Alarm correlation based on chronicle
  formalism      multi-event correlation
  component using input IDS alerts (Morin
  and Debar 2003)
• Probabilistic approach to alert
  correlation     providing a mathematical
  framework for fusing alerts that match
  closely but not perfectly (Valdes and
  Skinner 2001)


                                             12
Future Development of IDS techniques
Why use Artificial Intelligence?
• Flexibility (vs. threshold definition)
• Adaptability (vs. specific rules)
• Pattern Recognition (and detection of new
  patterns)
• Faster computing (faster than human)
• Learning abilities

AI tools:
• Neural Network
• Fuzzy logic
• Others
                                              13
Future Development of IDS techniques
Artificial Neural Network
Neural Network       identifying the typical
  characteristics of system user and statistically
  identify significant variations from the user’s
  established behaviours.
Type of Neural Network
• Multilayer perceptron
• Self Organising Map
• Radial basis neural networks
• Support Vector Machine
• Other


                                                     14
Future Development of IDS techniques

Potential implementation of Artificial Intelligence
  techniques on alert correlation:
• Multilayer perceptron and Support Vector
  Machine
   – Probabilistic output of these methods support the causal
     relationships of alerts, which is helpful for constructing
     attack scenarios (Zhu and Ghorbani 2006)
• Fuzzy Cognitive Modelling
   – A causal knowledge based reasoning mechanism with
     fuzzy cognitive modelling is used to correlate alerts by
     discovering causal relationships in alert data (Siraj and
     Vaughn 2005)




                                                                 15
Conclusions
• The problem of high false alarm rate has become
  one of the most critical issues faced by IDS
  today.
• The future of IDS lies on data correlation
• Alarm correlation mechanism aims at acquiring
  intrusion detection alerts and relating them
  together to expose a more condensed view of the
  security issues.
• Artificial Intelligence plays an important role in
  improving the performance of IDS technology.



                                                   16
Conclusions
Benefit of Artificial Intelligence:
• Flexibility (vs. threshold definition)
• Adaptability (vs. specific rules)
• Pattern Recognition (and detection of
  new patterns)
• Faster computing (faster than
  human)
• Learning abilities
                                       17
References
•   Allen, J., Christie, A. et al (2000), ‘State of the Practice of Intrusion
    Detection Technologies’, Technical Report CMU/SEI-99-TR-028, Carnegie
    Mellon University, available online:
    http://www.sei.cmu.edu/publications/documents/99.reports/99tr028/99tr02
    8abstract.html, date visited: 22 January 2007
•   Lee, W., Stolfo, S.J. (2000), “A Framework for Constructing Features and
    Models for Intrusion Detection Systems”, ACM Transactions on
    Information and System Security 3(4) pp. 227-261
•   Pietraszek, T., Tanner, A. (2005), “Data mining and machine learning -
    Towards reducing false positives in intrusion detection”, Information
    security technical report [1363-4127] 10(3) pp. 169-183
•   Pietraszek, T.: Using Adaptive Alert Classification to Reduce False
    Positives inIntrusion Detection. In Jonsson, E., Valdes, A., Almgren, M.,
    eds.: RAID ’04:Proc. 7th Symposium on Recent Advances in Intrusion
    Detection. Volume 3224 ofLNCS., Springer-Verlag (2004) 102–124
•   Julisch, K. (2001), “Mining Alarm Clusters to Improve Alarm Handling
    Efficiency”, In:ACSAC ’01: Proc. 17th Annual Computer Security
    Applications Conference (AC-SAC), ACM Press pp. 12–21
•   Siraj, A., Vaughn, R. (2005), “A Cognitive Model for Alert Correlation in a
    Distributed Environment” Lecture Notes in Computer Science vol.
    3495/2005, pp. 218-230


                                                                             18
References
•   Qiao, Y., Weixin, X.: A Network IDS with Low False Positive Rate. In
    Fogel,D.B., El-Sharkawi, M.A., Yao, X., Greenwood, G., Iba, H., Marrow,
    P., Shackleton,M., eds.: CEC ’02: Proc. IEEE Congress on Evolutionary
    Computation, IEEE Computer Society Press (2002) 1121–1126
•   Ning, P., Reeves, D., Cui, Y. (2001) “Correlating Alerts Using
    Prerequisites of Intrusions” Technical Report TR-2001-13, North Carolina
    State University
•   Debar H. and A. Wespi. (2001) “Aggregation and Correlation of Intrusion-
    Detection Alerts”, In Proceedings of the 4th International Symposium on
    Recent Advances in Intrusion Detection, Davis, CA, USA, pp. 85-103,
    October 2001
•   Valdes, A. and Skinner, K. (2001), “Probabilistic Alert Correlation”, In
    Proceedings of the 4th International Symposium on Recent Advances in
    Intrusion Detection, Davis, CA, USA, October, pp. 54-68
•   Morin, B., Debar, H., “Correlation of Intrusion Symptoms: an Application of
    Chronicles” (2003), Proceedings of the 6th symposium on Recent
    Advances in Intrusion Detection (RAID 2003), Carnegie Mellon University,
    Pittsburg, PA,. Springer LNCS 2820, pages 94-112.
•   Zhu, B., Ghorbani, A. (2006), “Alert Correlation for Extracting Attack
    Strategies”, International Journal of Network Security 3(2), pp. 244-258



                                                                             19
Q&A
Thank You




            20

More Related Content

What's hot

Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynetSina Manavi
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
Nemwos
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)mmubashirkhan
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
anupriti
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysisBikrant Gautam
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
Sam Bowne
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
Bob Marcus
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud securityAsmaa Ibrahim
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
Andrew McNicol
 
Presentation on Web Attacks
Presentation on Web AttacksPresentation on Web Attacks
Presentation on Web Attacks
Vivek Sinha Anurag
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Devil's Cafe
 
Cscu exam-info-and-test-objective
Cscu exam-info-and-test-objectiveCscu exam-info-and-test-objective
Cscu exam-info-and-test-objective
Tiger Virani
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) security
Nahidul Kibria
 

What's hot (20)

Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud security
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Presentation on Web Attacks
Presentation on Web AttacksPresentation on Web Attacks
Presentation on Web Attacks
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Cscu exam-info-and-test-objective
Cscu exam-info-and-test-objectiveCscu exam-info-and-test-objective
Cscu exam-info-and-test-objective
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) security
 

Viewers also liked

IDS with Artificial Intelligence
IDS with Artificial IntelligenceIDS with Artificial Intelligence
IDS with Artificial IntelligenceConferencias FIST
 
OTG-Recon
OTG-ReconOTG-Recon
Future Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudFuture Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloud
Sedthakit Prasanphanich
 
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Disha Bedi
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Wei-Yu Chen
 
IDS alert classification model
IDS alert classification modelIDS alert classification model
IDS alert classification model
dilipjangam91
 
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Disha Bedi
 
Nfv
NfvNfv
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
Disha Bedi
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
Paul Green
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian Network
IOSR Journals
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
shraddha_b
 
Lecture artificial neural networks and pattern recognition
Lecture   artificial neural networks and pattern recognitionLecture   artificial neural networks and pattern recognition
Lecture artificial neural networks and pattern recognition
Hưng Đặng
 

Viewers also liked (13)

IDS with Artificial Intelligence
IDS with Artificial IntelligenceIDS with Artificial Intelligence
IDS with Artificial Intelligence
 
OTG-Recon
OTG-ReconOTG-Recon
OTG-Recon
 
Future Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudFuture Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloud
 
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
 
IDS alert classification model
IDS alert classification modelIDS alert classification model
IDS alert classification model
 
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
 
Nfv
NfvNfv
Nfv
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian Network
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Lecture artificial neural networks and pattern recognition
Lecture   artificial neural networks and pattern recognitionLecture   artificial neural networks and pattern recognition
Lecture artificial neural networks and pattern recognition
 

Similar to IDS - Fact, Challenges and Future

An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...
IJECEIAES
 
Msc dare journal 1
Msc dare journal 1Msc dare journal 1
Msc dare journal 1
OluwadareOlatunji1
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
IJNSA Journal
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
IJNSA Journal
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
ijcsit
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
IJCSIS Research Publications
 
C3602021025
C3602021025C3602021025
C3602021025
ijceronline
 
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
CSEIJJournal
 
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierAttack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest Classifier
CSEIJJournal
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
IJMER
 
Supervised Machine Learning Algorithms for Intrusion Detection.pptx
Supervised Machine Learning Algorithms for Intrusion Detection.pptxSupervised Machine Learning Algorithms for Intrusion Detection.pptx
Supervised Machine Learning Algorithms for Intrusion Detection.pptx
ssuserf3a100
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET Journal
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
IJNSA Journal
 
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAINSURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
ijcseit
 
Survey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chainSurvey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chain
ijcseit
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
ijcseit
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
IJNSA Journal
 
A45010107
A45010107A45010107
A45010107
IJERA Editor
 
Machine learning-based intrusion detection system for detecting web attacks
Machine learning-based intrusion detection system for detecting web attacksMachine learning-based intrusion detection system for detecting web attacks
Machine learning-based intrusion detection system for detecting web attacks
IAESIJAI
 

Similar to IDS - Fact, Challenges and Future (20)

An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...
 
Msc dare journal 1
Msc dare journal 1Msc dare journal 1
Msc dare journal 1
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
 
C3602021025
C3602021025C3602021025
C3602021025
 
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIERATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
ATTACK DETECTION AVAILING FEATURE DISCRETION USING RANDOM FOREST CLASSIFIER
 
Attack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest ClassifierAttack Detection Availing Feature Discretion using Random Forest Classifier
Attack Detection Availing Feature Discretion using Random Forest Classifier
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
Supervised Machine Learning Algorithms for Intrusion Detection.pptx
Supervised Machine Learning Algorithms for Intrusion Detection.pptxSupervised Machine Learning Algorithms for Intrusion Detection.pptx
Supervised Machine Learning Algorithms for Intrusion Detection.pptx
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
 
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAINSURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
 
Survey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chainSurvey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chain
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
 
A45010107
A45010107A45010107
A45010107
 
A45010107
A45010107A45010107
A45010107
 
Machine learning-based intrusion detection system for detecting web attacks
Machine learning-based intrusion detection system for detecting web attacksMachine learning-based intrusion detection system for detecting web attacks
Machine learning-based intrusion detection system for detecting web attacks
 

More from amiable_indian

Phishing As Tragedy of the Commons
Phishing As Tragedy of the CommonsPhishing As Tragedy of the Commons
Phishing As Tragedy of the Commonsamiable_indian
 
Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art amiable_indian
 
Secrets of Top Pentesters
Secrets of Top PentestersSecrets of Top Pentesters
Secrets of Top Pentestersamiable_indian
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...amiable_indian
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
Reverse Engineering for exploit writers
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writersamiable_indian
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
AntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the uglyAntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the uglyamiable_indian
 
Reverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure CodingReverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure Codingamiable_indian
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learnedamiable_indian
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunityamiable_indian
 
Reverse Engineering for exploit writers
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writersamiable_indian
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecuritiesamiable_indian
 
Web Exploit Finder Presentation
Web Exploit Finder PresentationWeb Exploit Finder Presentation
Web Exploit Finder Presentationamiable_indian
 
Network Security Data Visualization
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualization
amiable_indian
 
Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization
amiable_indian
 
Top Network Vulnerabilities Over Time
Top Network Vulnerabilities Over TimeTop Network Vulnerabilities Over Time
Top Network Vulnerabilities Over Time
amiable_indian
 
What are the Business Security Metrics?
What are the Business Security Metrics? What are the Business Security Metrics?
What are the Business Security Metrics?
amiable_indian
 

More from amiable_indian (20)

Phishing As Tragedy of the Commons
Phishing As Tragedy of the CommonsPhishing As Tragedy of the Commons
Phishing As Tragedy of the Commons
 
Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art
 
Secrets of Top Pentesters
Secrets of Top PentestersSecrets of Top Pentesters
Secrets of Top Pentesters
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Reverse Engineering for exploit writers
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writers
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
AntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the uglyAntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the ugly
 
Reverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure CodingReverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure Coding
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learned
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunity
 
Reverse Engineering for exploit writers
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writers
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
 
Web Exploit Finder Presentation
Web Exploit Finder PresentationWeb Exploit Finder Presentation
Web Exploit Finder Presentation
 
Network Security Data Visualization
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualization
 
Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization
 
Top Network Vulnerabilities Over Time
Top Network Vulnerabilities Over TimeTop Network Vulnerabilities Over Time
Top Network Vulnerabilities Over Time
 
What are the Business Security Metrics?
What are the Business Security Metrics? What are the Business Security Metrics?
What are the Business Security Metrics?
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

IDS - Fact, Challenges and Future

  • 1. Intrusion Detection System: Facts, Challenges and Futures By Gina Tjhai 13th March 2007 Network Research Group 1
  • 2. Overview • Introduction • Challenges of current IDS • Potential solutions • Alarm Correlation • Existing methods of Alarm Correlation • Future IDS developments 2
  • 3. Introduction What is actually Intrusion Detection System (IDS)? • A component of computer and network infrastructure which is aimed at detecting attacks against computer systems and networks, or information system. IDS implementation: • As a hardware installed on the network • Or as an agent on an existing piece of hardware that is connected to the network. 3
  • 4. Introduction Component of IDS – Information Collection – Detection – Response Parameters of IDS – Accuracy – Performance – Completeness 4
  • 5. Introduction IDS Classification • Sources • Application-based • Host-based • Network-based • Hybrid • Detection Mechanism • Misuse detection • Anomaly based • Hybrid • Response • Active • Passive 5
  • 6. Challenges of IDS • Runtime limitations • Specification of detection signatures • Dependency on environment High rate of false alarms – the limiting factor for the performance of an intrusion detection system Is fine-tuning effective? 6
  • 7. Potential Solutions • Data mining The creation of complex database which is used to record data related to specific activities. Through the data generated, a pattern or model will be developed by knowledge seeker based on the accumulated data processed by the algorithm implemented on the front end application. • Examples: – Applying the concept of root cause (“the reason for which alerts occur”) (Dain and Cunningham 2001) – Sequential pattern mining and episode rules (Lee and Stolfo 2000) 7
  • 8. Potential Solutions • Machine learning technique Referring to a system capable of the autonomous acquisition and integration of knowledge • Example: – Alert Classification true positives and false positive (Pietraszek 2004) 8
  • 9. Potential Solutions • Co-simulation mechanism (based on a biological immune mechanism) (Qiao and Weixin 2002) – Integrating the misuse detection technique with the anomaly detection technique – Applying a co-stimulation mechanism Alarm Correlation 9
  • 10. Alert Correlation “Correlating alarms”: combining the fragmented information contained in the alert sequences and interpreting the whole flow of alerts Functional requirements: • Modifying alarms • Suppressing alarms • Clearing active alarms • Generating new alarms • Delaying alarms 10
  • 11. Existing methods of Alarm Correlation • Correlating alerts based on the prerequisites of intrusion providing a high level of representation of the correlated alerts, and thus reveals the structure of series of attacks. (Ning et al. 2001) • Correlating alerts based on the similarities between alert features grouping alerts into scenario depending on the number of matching attributes from the most general to the most specific cases. (Debar and Wespi 2001) 11
  • 12. Existing methods of Alarm Correlation • Alarm correlation based on chronicle formalism multi-event correlation component using input IDS alerts (Morin and Debar 2003) • Probabilistic approach to alert correlation providing a mathematical framework for fusing alerts that match closely but not perfectly (Valdes and Skinner 2001) 12
  • 13. Future Development of IDS techniques Why use Artificial Intelligence? • Flexibility (vs. threshold definition) • Adaptability (vs. specific rules) • Pattern Recognition (and detection of new patterns) • Faster computing (faster than human) • Learning abilities AI tools: • Neural Network • Fuzzy logic • Others 13
  • 14. Future Development of IDS techniques Artificial Neural Network Neural Network identifying the typical characteristics of system user and statistically identify significant variations from the user’s established behaviours. Type of Neural Network • Multilayer perceptron • Self Organising Map • Radial basis neural networks • Support Vector Machine • Other 14
  • 15. Future Development of IDS techniques Potential implementation of Artificial Intelligence techniques on alert correlation: • Multilayer perceptron and Support Vector Machine – Probabilistic output of these methods support the causal relationships of alerts, which is helpful for constructing attack scenarios (Zhu and Ghorbani 2006) • Fuzzy Cognitive Modelling – A causal knowledge based reasoning mechanism with fuzzy cognitive modelling is used to correlate alerts by discovering causal relationships in alert data (Siraj and Vaughn 2005) 15
  • 16. Conclusions • The problem of high false alarm rate has become one of the most critical issues faced by IDS today. • The future of IDS lies on data correlation • Alarm correlation mechanism aims at acquiring intrusion detection alerts and relating them together to expose a more condensed view of the security issues. • Artificial Intelligence plays an important role in improving the performance of IDS technology. 16
  • 17. Conclusions Benefit of Artificial Intelligence: • Flexibility (vs. threshold definition) • Adaptability (vs. specific rules) • Pattern Recognition (and detection of new patterns) • Faster computing (faster than human) • Learning abilities 17
  • 18. References • Allen, J., Christie, A. et al (2000), ‘State of the Practice of Intrusion Detection Technologies’, Technical Report CMU/SEI-99-TR-028, Carnegie Mellon University, available online: http://www.sei.cmu.edu/publications/documents/99.reports/99tr028/99tr02 8abstract.html, date visited: 22 January 2007 • Lee, W., Stolfo, S.J. (2000), “A Framework for Constructing Features and Models for Intrusion Detection Systems”, ACM Transactions on Information and System Security 3(4) pp. 227-261 • Pietraszek, T., Tanner, A. (2005), “Data mining and machine learning - Towards reducing false positives in intrusion detection”, Information security technical report [1363-4127] 10(3) pp. 169-183 • Pietraszek, T.: Using Adaptive Alert Classification to Reduce False Positives inIntrusion Detection. In Jonsson, E., Valdes, A., Almgren, M., eds.: RAID ’04:Proc. 7th Symposium on Recent Advances in Intrusion Detection. Volume 3224 ofLNCS., Springer-Verlag (2004) 102–124 • Julisch, K. (2001), “Mining Alarm Clusters to Improve Alarm Handling Efficiency”, In:ACSAC ’01: Proc. 17th Annual Computer Security Applications Conference (AC-SAC), ACM Press pp. 12–21 • Siraj, A., Vaughn, R. (2005), “A Cognitive Model for Alert Correlation in a Distributed Environment” Lecture Notes in Computer Science vol. 3495/2005, pp. 218-230 18
  • 19. References • Qiao, Y., Weixin, X.: A Network IDS with Low False Positive Rate. In Fogel,D.B., El-Sharkawi, M.A., Yao, X., Greenwood, G., Iba, H., Marrow, P., Shackleton,M., eds.: CEC ’02: Proc. IEEE Congress on Evolutionary Computation, IEEE Computer Society Press (2002) 1121–1126 • Ning, P., Reeves, D., Cui, Y. (2001) “Correlating Alerts Using Prerequisites of Intrusions” Technical Report TR-2001-13, North Carolina State University • Debar H. and A. Wespi. (2001) “Aggregation and Correlation of Intrusion- Detection Alerts”, In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection, Davis, CA, USA, pp. 85-103, October 2001 • Valdes, A. and Skinner, K. (2001), “Probabilistic Alert Correlation”, In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection, Davis, CA, USA, October, pp. 54-68 • Morin, B., Debar, H., “Correlation of Intrusion Symptoms: an Application of Chronicles” (2003), Proceedings of the 6th symposium on Recent Advances in Intrusion Detection (RAID 2003), Carnegie Mellon University, Pittsburg, PA,. Springer LNCS 2820, pages 94-112. • Zhu, B., Ghorbani, A. (2006), “Alert Correlation for Extracting Attack Strategies”, International Journal of Network Security 3(2), pp. 244-258 19