Security Enhancement in Distributed Networks Using Link-Based Mapping Scheme for Network Intrusion Detection with Enhanced Bloom Filter

作者: K Saravanan , A Senthilkumar , None

DOI: 10.1007/S11277-015-2662-1

关键词:

摘要: To prevent and monitor the unauthorized usage of data access, security on network is implemented by authenticating data. Network intrusion detection system monitors traffic measures information to identify suspicious activities. In distributed networks, administrator has authorize user access. When large set concerned in applications two complex issues be solved are organization decision making. address these issues, a space efficient structure, called bloom filter used which effectively organizes decides presence reliability. However, using advanced filtering techniques, intruders easily hack authorized for operations. At same time, when processing information, it difficult access secured manner standard filters. enhance over from intruders, an enhanced technique presented represent secure applied like web caching, peer networks etc. Additionally, restrict dataset malicious activities with upper bound false-positive probability increasing its capacity as packet size increases. The occurrence cleared mapping elements appropriate setting database hash functions, minimizing number resets created at time improving mean hit ratio. An experimental evaluation done KDD cup 1999 extracted UCI repository estimate performance proposed link-based Performance measured terms false positive probability, negative ratio, scalability, security. results reveals that achieves 42.5 % higher against existing dynamic approach.

参考文章(21)
Kun Xie, Yinghua Min, Dafang Zhang, Gaogang Xie, Jigang Wen, Basket Bloom Filters for Membership Queries ieee region 10 conference. pp. 1- 6 ,(2005) , 10.1109/TENCON.2005.301258
K Saravanan, A Senthilkumar, None, FPGA implementation of Secure Authentication in WiMAX Networks using Modified WiMAX Bloom filter: A Hardware Approach Journal of Discrete Mathematical Sciences and Cryptography. ,vol. 16, pp. 393- 404 ,(2013) , 10.1080/09720529.2013.858504
Markku Antikainen, Tuomas Aura, Mikko Sarela, Denial-of-service attacks in bloom-filter-based forwarding IEEE ACM Transactions on Networking. ,vol. 22, pp. 1463- 1476 ,(2014) , 10.1109/TNET.2013.2281614
Saar Cohen, Yossi Matias, Spectral bloom filters international conference on management of data. pp. 241- 252 ,(2003) , 10.1145/872757.872787
J.Lawrence Carter, Mark N. Wegman, Universal classes of hash functions Journal of Computer and System Sciences. ,vol. 18, pp. 143- 154 ,(1979) , 10.1016/0022-0000(79)90044-8
Ori Rottenstreich, Yossi Kanizo, Isaac Keslassy, The variable-increment counting bloom filter IEEE ACM Transactions on Networking. ,vol. 22, pp. 1092- 1105 ,(2014) , 10.1109/TNET.2013.2272604
MyungKeun Yoon, Aging Bloom Filter with Two Active Buffers for Dynamic Sets IEEE Transactions on Knowledge and Data Engineering. ,vol. 22, pp. 134- 138 ,(2010) , 10.1109/TKDE.2009.136
Wassim Itani, Cesar Ghali, Ahmad El Hajj, Ayman Kayssi, Ali Chehab, SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks 2010 IEEE Global Telecommunications Conference GLOBECOM 2010. pp. 1- 6 ,(2010) , 10.1109/GLOCOM.2010.5684305
Michael Paynter, Taskin Kocak, Fully pipelined bloom filter architecture IEEE Communications Letters. ,vol. 12, pp. 855- 857 ,(2008) , 10.1109/LCOMM.2008.081176
S. Dharmapurikar, P. Krishnamurthy, T.S. Sproull, J.W. Lockwood, Deep packet inspection using parallel bloom filters IEEE Micro. ,vol. 24, pp. 52- 61 ,(2004) , 10.1109/MM.2004.1268997