A novel intrusion detection system for a local computer network

被引:0
|
作者
Tokhtabayev, A. [1 ]
Altaibek, A. [2 ]
Skormin, V. [1 ]
Tukeyev, U. [2 ]
机构
[1] Binghamton Univ, Binghamton, NY USA
[2] Kazakh Natl Univ, Alma Ata, Kazakhstan
关键词
decision-making under uncertainty; utility; possibility theory; inclusion index; comonotone fuzzy sets; Choquet integral;
D O I
10.1007/978-3-540-73986-9_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Local computer networks at major universities are routinely plagued by self-replicating malicious software. Due to the intensive exchange of data and information within the network, when modern viruses, worms and malicious software are introduced they propagate very quickly, leaving little or no time for human intervention. Such environments are ideal for the implementation of the automatic IDS described herein. It employs the Dynamic Code Analyzer (DCA) that detects malicious software during run time by monitoring system calls invoked by individual processes and detecting subsequences (patterns) of system calls indicative of attempted self-replication. A similar approach, also utilizing system calls, is developed for the detection of network worms. Both techniques have the potential for detecting previously unknown malicious software and significantly reducing computer resource utilization. Unfortunately, in comparison with traditional signature based antivirus software, both approaches have a much higher rate of false alarms. To address this shortcoming the authors propose a method to search for evidence of the alarm propagation within the network. This is achieved by aggregating alarms from individual hosts at a server where these alarms can be correlated, resulting in a highly accurate detection capability. Such a system, implementing the presented technology, and capable of significantly reducing the downtime of networked computers owned by students and faculty, is being implemented at the computer network at the Kazakh National University.
引用
收藏
页码:320 / +
页数:2
相关论文
共 50 条
  • [41] A NOVEL ANOMALY-NETWORK INTRUSION DETECTION SYSTEM USING ABC ALGORITHMS
    Bae, Changseok
    Yeh, Wei-Chang
    Shukran, Mohd Afizi Mohd
    Chung, Yuk Ying
    Hsieh, Tsung-Jung
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (12): : 8231 - 8248
  • [42] Network processor based network intrusion detection system
    Cho, H
    Kim, D
    Kim, J
    Doh, Y
    Jang, J
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 973 - 982
  • [43] A novel hybrid intrusion detection system (Ids) for the detection of internet of things (IoT) network attacks
    Ramadan R.A.
    Yadav K.
    Annals of Emerging Technologies in Computing, 2020, 4 (05) : 61 - 74
  • [44] An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection
    Liu, Jiannan
    Xiao, Kun
    Luo, Lei
    Li, Yun
    Chen, Lirong
    2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS 2020), 2020, : 122 - 129
  • [45] A novel outlier detection scheme for network intrusion detection systems
    Prakobphol, Komsit
    Zhan, Justin
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 555 - 560
  • [46] Computer Immunity Using An Intrusion Detection System (IDS)
    Konyeha, Susan
    Onibere, Emmanuel A.
    ADVANCES IN MATERIALS AND SYSTEMS TECHNOLOGIES IV, 2013, 824 : 200 - 205
  • [47] Performance of network intrusion detection cluster system
    Watanabe, K
    Tsuruoka, N
    Himeno, R
    HIGH PERFORMANCE COMPUTING, 2003, 2858 : 278 - 287
  • [48] Ensemble Classifiers for Network Intrusion Detection System
    Zainal, Anazida
    Maarof, Mohd Aizaini
    Shamsuddin, Siti Mariyam
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (03): : 217 - 225
  • [49] Network Intrusion Detection System in a Light Bulb
    Manocchio, Liam Daly
    Layeghy, Siamak
    Portmann, Marius
    2022 32ND INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2022, : 359 - 366
  • [50] Forest intrusion detection system with sensor network
    Koszteczky, Bence
    Vakulya, Gergely
    Simon, Gyula
    2015 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE (I2MTC), 2015, : 1672 - 1676