WIDS Real-Time Intrusion Detection System Using Entrophical Approach

作者: Kamalanaban Ethala , R. Sheshadri , S. Sibi Chakkaravarthy

DOI: 10.1007/978-81-322-2126-5_9

关键词:

摘要: Nowadays, threats, worms, virus, and malwares in the Internet security breaches such as intrusion penetration testing network are quite common lead to loss of huge amount data. In recent decades, various researchers revealed their perceptions on security-related issues. this paper, we propose a robust detection system based Entrophical approach. Here, our monitors normal behavior by means probabilistic with monitoring active ARP protocol all PCAP files captured packet analyzer detects deviation PCAP. approach deals profiling strategy; here, data logs users classified profiles base, daemon, user. Various IDS compared model-based IDS. Experimental results snort, onion, methodology show that model is level head through many phases, comparison outstrips reliable performance. Real-time have also been enhanced. This first claim for designing an combat real-time attacks aircrack-ng, airmon-ng, airodump-ng from operating “BACKTRACK.”

参考文章(22)
Biying Zhang, Research on Intrusion Detection Based on Heuristic Genetic Neural Network Advances in Intelligent and Soft Computing. pp. 567- 573 ,(2012) , 10.1007/978-3-642-28658-2_89
Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee, Network Intrusion Detection and Prevention Ai & Society. ,vol. 47, ,(2010) , 10.1007/978-0-387-88771-5
Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel, Advanced Reaction Using Risk Assessment in Intrusion Detection Systems Critical Information Infrastructures Security. pp. 58- 70 ,(2008) , 10.1007/978-3-540-89173-4_6
Karen A. Garcia, Raúl Monroy, Luis A. Trejo, Carlos Mex-Perera, Eduardo Aguirre, Analyzing Log Files for Postmortem Intrusion Detection systems man and cybernetics. ,vol. 42, pp. 1690- 1704 ,(2012) , 10.1109/TSMCC.2012.2217325
Wenjie Zhu, Qiang Wang, Improving intrusion detection through merging heterogeneous IP data international conference on information and automation. pp. 122- 125 ,(2012) , 10.1109/ICINFA.2012.6246794
Ali Modirkhazeni, Norafida Ithnin, Othman Ibrahim, None, Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis 2010 Second International Conference on Network Applications, Protocols and Services. pp. 228- 233 ,(2010) , 10.1109/NETAPPS.2010.48
Benyuan Liu, Peter Brass, Olivier Dousse, Philippe Nain, Don Towsley, Mobility improves coverage of sensor networks mobile ad hoc networking and computing. pp. 300- 308 ,(2005) , 10.1145/1062689.1062728
Zhou Mingqiang, Huang Hui, Wang Qian, A graph-based clustering algorithm for anomaly intrusion detection 2012 7th International Conference on Computer Science & Education (ICCSE). pp. 1311- 1314 ,(2012) , 10.1109/ICCSE.2012.6295306
Yun Wang, Weihuang Fu, Dharma P. Agrawal, Intrusion detection in Gaussian distributed Wireless Sensor Networks mobile adhoc and sensor systems. pp. 313- 321 ,(2009) , 10.1109/MOBHOC.2009.5336982
S. Janakiraman, S. Rajasoundaran, P. Narayanasamy, The Model — Dynamic and Flexible Intrusion Detection Protocol for high error rate Wireless Sensor Networks based on data flow 2012 International Conference on Computing, Communication and Applications. pp. 1- 6 ,(2012) , 10.1109/ICCCA.2012.6179178