A security policy and Network Cartography based Intrusion Detection and Prevention Systems

被引:0
|
作者
Meharouech, Sourour [1 ]
Bouhoula, Adel [1 ]
Abbes, Tarek [1 ]
机构
[1] Higher Sch Telecommun SupCom, Dept Comp Sci & Networks, Digital Secur unit, Cit El Ghazala 2083, Tunisia
来源
关键词
Network security; Intrusion Detection System; Intrusion Prevention System; Security Policy; Network cartography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During this time when Internet provides essential communication between an infinite numbers of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are now considered a mainstream security technology. IDS and IPS are designed to identify security breaches. However, one of the most problems with current IDS and IPS is the lack of the "environmental awareness" (i.e. security policy, network topology and software). This ignorance triggers many false positives and false negatives. a false negative is corresponding to a non-detected attack and it occurs because an attacker is misclassified as a normal user. A false positive is corresponding to a false alert and it occurs because the IDS/IPS misinterprets normal packets or activities as attacks. In this paper, we propose a novel intrusion detection and prevention architecture where we integrate the characteristics and the properties of the protected system in the traffic analysis process. Our solution has been verified in IDS and IPS system and achieved a significant reduction in the number of false positives and false negatives.
引用
收藏
页码:279 / 291
页数:13
相关论文
共 50 条
  • [21] The statistical analysis of a network traffic for the intrusion detection and prevention systems
    Kuznetsov, A.A.
    Smirnov, A.A.
    Danilenko, D.A.
    Berezovsky, A.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2015, 74 (01): : 61 - 78
  • [22] Weaknesses and Strengths Analysis over Network-based Intrusion Detection and Prevention Systems
    Guillen, Edward
    Padilla, Daniel
    Colorado, Yudy
    2009 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM 2009), 2009, : 181 - 185
  • [23] Research on Data Pollution Prevention in Network Intrusion Detection Systems Based on Naive Bayes
    Lu, Yinglun
    Xie, Tian
    Shen, Jiyue
    Xu, Sheng
    Sun, Pan
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 114 - 118
  • [24] Application of Intrusion Prevention in Campus Network Security
    Zhao, Weiguo
    Pan, Gangzhu
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 4279 - +
  • [25] Network security monitoring - Intrusion detection
    Davis, J
    Hill, E
    Spradley, L
    Wright, M
    Scherer, W
    Zhang, YY
    2003 IEEE SYSTEMS & INFORMATION ENGINEERING DESIGN SYMPOSIUM, 2003, : 241 - 246
  • [26] Detection and Recognition of Atomic Evasions Against Network Intrusion Detection/Prevention Systems
    Jia Jingping
    Chen Kehua
    Chen Jia
    Zhou Dengwen
    Ma Wei
    IEEE ACCESS, 2019, 7 : 87816 - 87826
  • [27] Network Intrusion Detection for IoT Security Based on Learning Techniques
    Chaabouni, Nadia
    Mosbah, Mohamed
    Zemmari, Akka
    Sauvignac, Cyrille
    Faruki, Parvez
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03): : 2671 - 2701
  • [28] HOSPITAL NETWORK SECURITY INTRUSION DETECTION BASED ON DIGITAL COMPUTING
    Zhao, F.
    Zhang, Y. M.
    Zhao, D. Q.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2016, 119 : 6 - 6
  • [29] Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
    Mahajan, Varun
    Peddoju, Sateesh K.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 829 - 834
  • [30] PIDS: A packet based approach to network intrusion detection and prevention
    Ahmed, Martuza
    Pal, Rima
    Hossain, Md. Mojammel
    Bikas, Md. Abu Naser
    Ruhunnabi, Abdullahil Baki Md.
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 124 - 127