IP Spoofing Detection Approach(ISDA) for network Intrusion detection system

被引:0
|
作者
Song, Sui [1 ]
Manikopoulos, C. N. [1 ]
机构
[1] New Jersey Inst Technol, ECE Dept, Newark, NJ 07102 USA
关键词
flow; field aggregation schemes; prefix aggregation scheme; flow aggregation scheme; neural network classifier; Flow-based Network Intrusion Detection System;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A new approach for detecting spoofed IP level, called IP Spoofing Detection Approach (ISDA), is proposed. The purpose of this approach is maximally to keep effective parts and remove forged parts of Source IP addresses under flooding attacks and dynamically configure flow aggregation scheme for flow-based network Intrusion detection to build the most effective intrusion detection approach. Our work concentrates on developing an overall framework, which includes building flow aggregation schemes for Flow-based Network Intrusion Detection System (FNIDS), detecting IP address spoofing level and using Fuzzy logic method automatically to activate the most appropriate flow aggregation scheme. Finally, the performance of applying our proposed architecture against flooding DDOS attacks is evaluated by using DARPA 98 data. Results show the significant improvement for FNIDS after applying the IP address spoofing detection algorithms.
引用
收藏
页码:355 / 358
页数:4
相关论文
共 50 条
  • [21] A new approach to intrusion detection system
    Laboratoire de Recherche en Informatique et Télécommunications, Faculty of Sciences, University of Mohammed V, Rabat, Morocco
    J. Theor. Appl. Inf. Technol., 2 (284-289):
  • [22] Unsupervised learning approach for network intrusion detection system using autoencoders
    Hyunseung Choi
    Mintae Kim
    Gyubok Lee
    Wooju Kim
    The Journal of Supercomputing, 2019, 75 : 5597 - 5621
  • [23] A Deep Reinforcement Learning Approach for Anomaly Network Intrusion Detection System
    Hsu, Ying-Feng
    Matsuoka, Morito
    2020 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2020,
  • [24] A Novel Approach of intrusion detection system design for computer network security
    Yi, Julan
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 3021 - 3025
  • [25] The DEMIAN system approach to intrusion detection
    Gluz, JC
    Viccari, RM
    Sperb, JK
    CONCURRENT ENGINEERING: ENHANCED INTEROPERABLE SYSTEMS, 2003, : 189 - 197
  • [26] A Futuristic Analysis Approach of Neural Network for Intrusion Detection System.
    Khan, Rahim
    Al-Shehri, Mohmmed
    DILEMAS CONTEMPORANEOS-EDUCACION POLITICA Y VALORES, 2019, 6 (03):
  • [27] Unsupervised learning approach for network intrusion detection system using autoencoders
    Choi, Hyunseung
    Kim, Mintae
    Lee, Gyubok
    Kim, Wooju
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (09): : 5597 - 5621
  • [28] MANDA: On Adversarial Example Detection for Network Intrusion Detection System
    Wang, Ning
    Chen, Yimin
    Hu, Yang
    Lou, Wenjing
    Hou, Y. Thomas
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [29] An Integrated Approach to Network Intrusion Detection and Prevention
    Prakash, B. Bhanu
    Yeswanth, Kaki
    Srinivas, M. Sai
    Balaji, S.
    Sekhar, Y. Chandra
    Nair, Aswathy K.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 43 - 51
  • [30] A Network Intrusion Detection Approach at the Edge of Fog
    Azarkasb, Seyed Omid
    Kashi, Saeed Sedighian
    Khasteh, Seyed Hossein
    2021 26TH INTERNATIONAL COMPUTER CONFERENCE, COMPUTER SOCIETY OF IRAN (CSICC), 2021,