A novel intrusion detection system for a local computer network

被引:0
|
作者
Tokhtabayev, A. [1 ]
Altaibek, A. [2 ]
Skormin, V. [1 ]
Tukeyev, U. [2 ]
机构
[1] Binghamton Univ, Binghamton, NY USA
[2] Kazakh Natl Univ, Alma Ata, Kazakhstan
关键词
decision-making under uncertainty; utility; possibility theory; inclusion index; comonotone fuzzy sets; Choquet integral;
D O I
10.1007/978-3-540-73986-9_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Local computer networks at major universities are routinely plagued by self-replicating malicious software. Due to the intensive exchange of data and information within the network, when modern viruses, worms and malicious software are introduced they propagate very quickly, leaving little or no time for human intervention. Such environments are ideal for the implementation of the automatic IDS described herein. It employs the Dynamic Code Analyzer (DCA) that detects malicious software during run time by monitoring system calls invoked by individual processes and detecting subsequences (patterns) of system calls indicative of attempted self-replication. A similar approach, also utilizing system calls, is developed for the detection of network worms. Both techniques have the potential for detecting previously unknown malicious software and significantly reducing computer resource utilization. Unfortunately, in comparison with traditional signature based antivirus software, both approaches have a much higher rate of false alarms. To address this shortcoming the authors propose a method to search for evidence of the alarm propagation within the network. This is achieved by aggregating alarms from individual hosts at a server where these alarms can be correlated, resulting in a highly accurate detection capability. Such a system, implementing the presented technology, and capable of significantly reducing the downtime of networked computers owned by students and faculty, is being implemented at the computer network at the Kazakh National University.
引用
收藏
页码:320 / +
页数:2
相关论文
共 50 条
  • [31] Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System
    Hussain, Jamal
    Lalmuanawma, Samuel
    RECENT DEVELOPMENTS IN INTELLIGENT COMPUTING, COMMUNICATION AND DEVICES, ICCD 2016, 2017, 555 : 73 - 87
  • [32] Research on Network Intrusion Detection System
    Xu, Jiang
    Cao, Zhongwei
    MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 : 77 - +
  • [33] Enhanced Network Intrusion Detection System
    Kotecha, Ketan
    Verma, Raghav
    Rao, Prahalad, V
    Prasad, Priyanshu
    Mishra, Vipul Kumar
    Badal, Tapas
    Jain, Divyansh
    Garg, Deepak
    Sharma, Shakti
    SENSORS, 2021, 21 (23)
  • [35] The Construction Research of Security Computer Network System Based on the Distributed Intrusion Detection Technology
    Huang, Xin
    Wan, Rongze
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 185 - 196
  • [36] Multi pattern matching algorithm for embedded computer network engineering intrusion detection system
    Cai, Yingying
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2024, 18 (02): : 705 - 716
  • [37] Realistic Computer Network Simulation for Network Intrusion Detection Dataset Generation
    Payer, Garrett
    NEXT-GENERATION ROBOTICS II; AND MACHINE INTELLIGENCE AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS IX, 2015, 9494
  • [38] A NOVEL INTRUSION DETECTION SYSTEM FOR MANETS
    Panos, Christoforos
    Xenakis, Christos
    Stavrakakis, Ioannis
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 25 - 34
  • [39] A Novel Architecture of Intrusion Detection System
    Zhang, Da
    Yeo, Chai Kiat
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 164 - 168
  • [40] A Novel Hybrid Model for Network Intrusion Detection
    Tiwari, Shobhit
    Roy, Sanjiban Sekhar
    Charaborty, Saptarshi
    Kumar, Anugrah
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 685 - 688