A security policy and Network Cartography based Intrusion Detection and Prevention Systems

被引:0
|
作者
Meharouech, Sourour [1 ]
Bouhoula, Adel [1 ]
Abbes, Tarek [1 ]
机构
[1] Higher Sch Telecommun SupCom, Dept Comp Sci & Networks, Digital Secur unit, Cit El Ghazala 2083, Tunisia
来源
关键词
Network security; Intrusion Detection System; Intrusion Prevention System; Security Policy; Network cartography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During this time when Internet provides essential communication between an infinite numbers of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are now considered a mainstream security technology. IDS and IPS are designed to identify security breaches. However, one of the most problems with current IDS and IPS is the lack of the "environmental awareness" (i.e. security policy, network topology and software). This ignorance triggers many false positives and false negatives. a false negative is corresponding to a non-detected attack and it occurs because an attacker is misclassified as a normal user. A false positive is corresponding to a false alert and it occurs because the IDS/IPS misinterprets normal packets or activities as attacks. In this paper, we propose a novel intrusion detection and prevention architecture where we integrate the characteristics and the properties of the protected system in the traffic analysis process. Our solution has been verified in IDS and IPS system and achieved a significant reduction in the number of false positives and false negatives.
引用
收藏
页码:279 / 291
页数:13
相关论文
共 50 条
  • [41] Study on Security Management Architecture for Sensor Network based on Intrusion Detection
    Peng, Xi
    Wu, Zheng
    Xiao, Debao
    Yu, Yang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 503 - +
  • [42] A Transformer-based network intrusion detection approach for cloud security
    Long, Zhenyue
    Yan, Huiru
    Shen, Guiquan
    Zhang, Xiaolu
    He, Haoyang
    Cheng, Long
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [43] Research On Network Security Intrusion Detection System Based On Machine Learning
    Luo, Yin
    International Journal of Network Security, 2021, 23 (03) : 490 - 495
  • [44] A Transformer-based network intrusion detection approach for cloud security
    Zhenyue Long
    Huiru Yan
    Guiquan Shen
    Xiaolu Zhang
    Haoyang He
    Long Cheng
    Journal of Cloud Computing, 13
  • [45] A technique research of intrusion detection on network security
    Yang, QX
    Han, X
    ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 4721 - 4724
  • [46] Enhancing IoT Network Security Using Feature Selection for Intrusion Detection Systems
    Almohaimeed, Muhannad
    Albalwy, Faisal
    APPLIED SCIENCES-BASEL, 2024, 14 (24):
  • [47] A Review on Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT
    Prajapati, Priteshkumar
    Bhatt, Bhumika
    Zalavadiya, Gautam
    Ajwalia, Madhav
    Shah, Parth
    2021 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2021), 2021, : 588 - 593
  • [48] Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy
    George, Laurent
    Tong, Valerie Viet Triem
    Me, Ludovic
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 355 - 356
  • [49] Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System
    Alrayes, Fatma S.
    Zakariah, Mohammed
    Amin, Syed Umar
    Khan, Zafar Iqbal
    Alqurni, Jehad Saad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (01): : 1457 - 1490
  • [50] Research on Network Security Intrusion Detection Method Based on Optimization Algorithm and Neural Network
    Li, Jie
    Li, Jing
    International Journal of Network Security, 2024, 26 (01) : 68 - 73