Efficient Snort Rule Generation using Evolutionary computing for Network Intrusion Detection

被引:4
|
作者
Muthuregunathan, Raghavan [1 ]
Siddharth, S. [1 ]
Srivathsan, R. [1 ]
Rajesh, S. R. [1 ]
机构
[1] Anna Univ, Madras Inst Technol, Madras 600025, Tamil Nadu, India
关键词
Network Intrusion Detection; Clustering; Genetic Algorithm; Hill Climbing; parallel Computing; Snort; Grid;
D O I
10.1109/CICSYN.2009.19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network Intrusion Detection (NIDS) tool has become an important tool in detecting malicious activities in a network. Snort is a free and open source Network Intrusion Detection and prevention tool which is basically a rule driven system. Hence rule development for such NIDS tools becomes a sensitive task. Clustering techniques had been widely used to cluster the network traffic and to derive rule sets based on the resultant clusters. We propose a parallel Clustering technique followed by usage of evolutionary computing comprising of Genetic Algorithm and Hill climbing to optimize the clusters formed. Rules are generated by analyzing each individual clusters formed The proposed system was specifically developed with a view to generate rule set for Snort based IDS efficiently. The results show that careful selection of fitness function could improve the efficiency of rule set generated The computing power offered by Grid is used to accomplish the parallel computing task. Parallel Computation requires Cluster based resources which are offered by Grid.
引用
收藏
页码:336 / 341
页数:6
相关论文
共 50 条
  • [31] Anomaly intrusion detection systems based on evolutionary computing
    Srinoy, Surat
    Chimphlee, Siriporn
    Chimphlee, Witcha
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 166 - +
  • [32] Framework of Intrusion Detection System via Snort Application on Campus Network Environment
    Ismail, Mohd Nazri
    Ismail, Mohd Taha
    INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATIONS, PROCEEDINGS, 2009, : 455 - 459
  • [33] Predictive Rule Discovery for Network Intrusion Detection
    Patel, Kanubhai
    Buddhadev, Bharat
    INTELLIGENT DISTRIBUTED COMPUTING, 2015, 321 : 287 - 298
  • [34] An Implementation of Hierarchical Intrusion Detection Systems Using Snort and Federated Databases
    Kang, Sarvjot Kaur
    Lindskog, Dale
    Samuel, Hamman
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1521 - 1525
  • [35] Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN
    Ujjan, Raja Majid Ali
    Pervez, Zeeshan
    Dahal, Keshav
    2019 13TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA), 2019,
  • [36] Development of an evolutionary framework for autonomous rule creation for intrusion detection
    Guruprasad, Sunitha
    D'Souza, Rio
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 534 - 538
  • [37] Research of the dynamical rule generation for intrusion detection system
    Liao, Niandong
    Tian, Shengfeng
    Beijing Jiaotong Daxue Xuebao/Journal of Beijing Jiaotong University, 2008, 32 (05): : 116 - 120
  • [38] Evolutionary Soft Computing Model Using Genetic-Fuzzy Classifier in Intrusion Detection
    Zhou, Yu-Ping
    Fang, Jian-An
    Yu, Dong-Mei
    PROCEEDINGS OF 2008 INTERNATIONAL COLLOQUIUM ON ARTIFICIAL INTELLIGENCE IN EDUCATION, 2008, : 247 - 251
  • [39] Memory-Efficient Random Forest Generation Method for Network Intrusion Detection
    Choi, Seok-Hwan
    Ko, DongHyun
    Hwang, SeonJin
    Choi, Yoon-Ho
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 305 - 307
  • [40] REAL-TIME TRAFFIC DETECTION and ANALYSIS of NETWORK SECURITY INTRUSION ATTACK: SNORT INTRUSION PREVENTION SYSTEM
    Zhou A.L.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2020, 79 (12): : 1055 - 1062