Efficient Snort Rule Generation using Evolutionary computing for Network Intrusion Detection

被引:4
|
作者
Muthuregunathan, Raghavan [1 ]
Siddharth, S. [1 ]
Srivathsan, R. [1 ]
Rajesh, S. R. [1 ]
机构
[1] Anna Univ, Madras Inst Technol, Madras 600025, Tamil Nadu, India
关键词
Network Intrusion Detection; Clustering; Genetic Algorithm; Hill Climbing; parallel Computing; Snort; Grid;
D O I
10.1109/CICSYN.2009.19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network Intrusion Detection (NIDS) tool has become an important tool in detecting malicious activities in a network. Snort is a free and open source Network Intrusion Detection and prevention tool which is basically a rule driven system. Hence rule development for such NIDS tools becomes a sensitive task. Clustering techniques had been widely used to cluster the network traffic and to derive rule sets based on the resultant clusters. We propose a parallel Clustering technique followed by usage of evolutionary computing comprising of Genetic Algorithm and Hill climbing to optimize the clusters formed. Rules are generated by analyzing each individual clusters formed The proposed system was specifically developed with a view to generate rule set for Snort based IDS efficiently. The results show that careful selection of fitness function could improve the efficiency of rule set generated The computing power offered by Grid is used to accomplish the parallel computing task. Parallel Computation requires Cluster based resources which are offered by Grid.
引用
收藏
页码:336 / 341
页数:6
相关论文
共 50 条
  • [41] Network Intrusion Detection Using Class Association Rule Mining Based on Genetic Network Programming
    Chen, Ci
    Mabu, Shingo
    Shimada, Kaoru
    Hirasawa, Kotaro
    IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2010, 5 (05) : 553 - 559
  • [42] A Statistical Rule Learning Approach to Network Intrusion Detection
    Rastegari, Samaneh
    Lam, Chiou-Peng
    Hingston, Philip
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [43] Network Intrusion Detection Using Transformer and BiGRU-DNN in Edge Computing
    Sun, Huijuan
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2024, 20 (04): : 458 - 476
  • [44] Edge Computing Network Intrusion Detection System in IoT Using Deep Learning
    Hinojosa, Andres
    Majd, Nahid Ebrahimi
    2024 33RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, ICCCN 2024, 2024,
  • [45] Threat Analysis in IOT Network Using Evolutionary Sparse Convolute Network Intrusion Detection System
    Raheema, Alaa Q.
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2023, 19 (03) : 18 - 33
  • [46] Evolutionary Convolutional Neural Network: An Application to Intrusion Detection
    Chen, Yi
    Chen, Shuo
    Xuan, Manlin
    Lin, Qiuzhen
    Wei, Wenhong
    2021 13TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), 2021, : 245 - 252
  • [47] Quantum Evolutionary Algorithm Based Network Intrusion Detection
    Yin, Xiangdong
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 683 - 685
  • [48] Efficient packet matching for gigabit network intrusion detection using TCAMs
    Gao, Ming
    Zhang, Kenong
    Lu, Jiahua
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 249 - +
  • [49] An intelligent and efficient network intrusion detection system using deep learning
    Qazi, Emad-ul-Haq
    Imran, Muhammad
    Haider, Noman
    Shoaib, Muhammad
    Razzak, Imran
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [50] Soft computing models for network intrusion detection systems
    Abraham, A
    Jain, R
    Classification and Clustering for Knowledge Discovery, 2005, 4 : 191 - 207