A security policy and Network Cartography based Intrusion Detection and Prevention Systems

被引:0
|
作者
Meharouech, Sourour [1 ]
Bouhoula, Adel [1 ]
Abbes, Tarek [1 ]
机构
[1] Higher Sch Telecommun SupCom, Dept Comp Sci & Networks, Digital Secur unit, Cit El Ghazala 2083, Tunisia
来源
关键词
Network security; Intrusion Detection System; Intrusion Prevention System; Security Policy; Network cartography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During this time when Internet provides essential communication between an infinite numbers of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are now considered a mainstream security technology. IDS and IPS are designed to identify security breaches. However, one of the most problems with current IDS and IPS is the lack of the "environmental awareness" (i.e. security policy, network topology and software). This ignorance triggers many false positives and false negatives. a false negative is corresponding to a non-detected attack and it occurs because an attacker is misclassified as a normal user. A false positive is corresponding to a false alert and it occurs because the IDS/IPS misinterprets normal packets or activities as attacks. In this paper, we propose a novel intrusion detection and prevention architecture where we integrate the characteristics and the properties of the protected system in the traffic analysis process. Our solution has been verified in IDS and IPS system and achieved a significant reduction in the number of false positives and false negatives.
引用
收藏
页码:279 / 291
页数:13
相关论文
共 50 条
  • [31] Implementation of SDN Based Network Intrusion Detection and Prevention System
    Chen, Pin-Jui
    Chen, Yen-Wen
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 141 - 146
  • [32] Neural network-based intrusion detection systems
    Hu, LX
    He, ZJ
    COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 296 - 298
  • [33] Fuzzy Logic based Network Intrusion Detection Systems
    Johanyak, Zsolt Csaba
    2020 IEEE 18TH WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI 2020), 2020, : 15 - 15
  • [34] REAL-TIME TRAFFIC DETECTION and ANALYSIS of NETWORK SECURITY INTRUSION ATTACK: SNORT INTRUSION PREVENTION SYSTEM
    Zhou A.L.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2020, 79 (12): : 1055 - 1062
  • [35] Policy-Based Profiles for Network Intrusion Response Systems
    Hughes, Kieran
    McLaughlin, Kieran
    Sezer, Sakir
    2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 279 - 286
  • [36] A Survey on Intrusion Detection and Prevention Systems
    Gupta N.
    Jindal V.
    Bedi P.
    SN Computer Science, 4 (5)
  • [37] A survey of intrusion detection and prevention systems
    Patel A.
    Qassim Q.
    Wills C.
    Information Management and Computer Security, 2010, 18 (04): : 277 - 290
  • [38] A Survey of Intrusion Detection and Prevention Systems
    Erney, Tristan
    Chowdhury, Md Minhaz
    2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 578 - 584
  • [39] Design of the Network Security Intrusion Detection System Based on the Cloud Computing
    Di, Meng
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 68 - 73
  • [40] Security System Construction of Land and Resources Network based on Intrusion Detection
    Shen, Chao
    Chen, Zhongyang
    Xue, Yu
    Shen, Chao
    Chen, Zhongyang
    Xue, Yu
    2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 795 - 799