Design and implementation of an anomaly-based network intrusion detection system utilizing the DNA model

被引:0
|
作者
Mahdy, Riham [1 ]
Saeb, Magdy [1 ]
机构
[1] Arab Acad Sci Technol & Maritime Transport, Dept Comp Engn, Sch Engn, Alexandria, Egypt
关键词
FPGA; anomaly identification; network intrusion detection; DNA computing; pattern matching; bioinformatics;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The genetic material that encodes the unique characteristics of each individual such as gender, eye color, and other human features is the well-known DNA. In this work, we introduce an anomaly intrusion detection system, built on the notion of a DNA sequence or gene, which is responsible for the normal network traffic patterns. Subsequently, the system detects suspicious activities by searching the "normal behavior DNA sequence" through string matching. On the other hand, string matching is a computationally intensive task and can be converted into a potential bottleneck without high-speed processing. Furthermore, conventional software-implemented string matching algorithms have not kept pace with the ever increasing network speeds. As a result, we adopt a monitoring phase that is hardware-implemented with the intention that DNA pattern matching is performed at wire-speed. Finally, we provide the details of our FPGA implementation of the bioinformatics-based string matching technique.
引用
收藏
页码:470 / 476
页数:7
相关论文
共 50 条
  • [41] A clustering method for improving performance of anomaly-based intrusion detection system
    Song, Jungsuk
    Ohira, Kenji
    Takakura, Hiroki
    Okabe, Yasuo
    Kwon, Yongjin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1282 - 1291
  • [42] A Hybrid Model for Anomaly-Based Intrusion Detection in Complex Computer Networks
    Protic, Danijela
    Stankovic, Miomir
    2020 21ST INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2020,
  • [43] An Anomaly-based Intrusion Detection System Using Butterfly Optimization Algorithm
    Mahboob, Amir Soltany
    Moghaddam, Mohammad Reza Ostadi
    2020 6TH IRANIAN CONFERENCE ON SIGNAL PROCESSING AND INTELLIGENT SYSTEMS (ICSPIS), 2020,
  • [44] Undermining an anomaly-based intrusion detection system using common exploits
    Tan, KMC
    Killourhy, KS
    Maxion, RA
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2002, 2516 : 54 - 73
  • [45] Design of an Anomaly-based Threat Detection & Explication System
    Luh, Robert
    Schrittwieser, Sebastian
    Marschalek, Stefan
    Janicke, Helge
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 397 - 402
  • [46] Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
    Bolzoni, Damiano
    Etalle, Sandro
    Hartel, Pieter H.
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 1 - 20
  • [47] Anomaly-based Network Intrusion Detection using Ensemble Machine Learning Approach
    Das, Abhijit
    Pramod
    Sunitha, B. S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (02) : 635 - 645
  • [48] Building Multiclass Classification Baselines for Anomaly-based Network Intrusion Detection Systems
    Shah, Ajay
    Clachar, Sophine
    Minimair, Manfred
    Cook, Davis
    2020 IEEE 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA 2020), 2020, : 759 - 760
  • [49] Constant False Alarm Rate Anomaly-Based Approach for Network Intrusion Detection
    AlShaalan, Rayan
    AsSadhan, Basil
    Al-Muhtadi, Jalal
    Bin-Abbas, Hesham
    Abd El-Samie, Fathi
    Alshebeili, Saleh
    2013 10TH INTERNATIONAL CONFERENCE ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES (HONET-CNS), 2013, : 141 - 145
  • [50] A systematic literature review of methods and datasets for anomaly-based network intrusion detection
    Yang, Zhen
    Liu, Xiaodong
    Li, Tong
    Wu, Di
    Wang, Jinjiang
    Zhao, Yunwei
    Han, Han
    COMPUTERS & SECURITY, 2022, 116