Intrusion Detection System Based on Real Time Rule Accession and Honeypot

作者: Abhay Nath Singh , Shiv Kumar , R. C. Joshi

DOI: 10.1007/978-3-642-22540-6_29

关键词:

摘要: The Intrusion Detection System (IDS) used today suffer from several shortcomings in the presence of complex and unknown attacks. detection system based on honeypot is proposed with Real Time Rule Accession (RTRA) capability. We make use to prevent attack collect traffic network. Furthermore, order improve performance our IDS, Apriori algorithm for association rule mining data logged by generate rules which will be added Snort IDS dynamically. This different previous method off-line base addition. experimental results show that intrusion efficient detecting attacks at time their occurrences even if was not equipped detect it.

参考文章(13)
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
Yun Yang, Jia Mi, Design and implementation of distributed intrusion detection system based on honeypot international conference on computer engineering and technology. ,vol. 6, ,(2010) , 10.1109/ICCET.2010.5486267
Leila Rikhtechi, Afshin Rezakhani Roozbahani, Creating a Standard Platform for All Intrusion Detection/Prevention Systems 2010 Second International Conference on Computer Modeling and Simulation. ,vol. 3, pp. 41- 44 ,(2010) , 10.1109/ICCMS.2010.385
Alfonso Valdes, Keith Skinner, Adaptive, Model-Based Monitoring for Cyber Attack Detection recent advances in intrusion detection. pp. 80- 92 ,(2000) , 10.1007/3-540-39945-3_6
Bharanidharan Shanmugam, Norbik Bashah Idris, None, Improved Intrusion Detection System Using Fuzzy Logic for Detecting Anamoly and Misuse Type of Attacks soft computing and pattern recognition. pp. 212- 217 ,(2009) , 10.1109/SOCPAR.2009.51
Wang Yunwu, Using Fuzzy Expert System Based on Genetic Algorithms for Intrusion Detection System international forum on information technology and applications. ,vol. 2, pp. 221- 224 ,(2009) , 10.1109/IFITA.2009.107
J. Mirkovic, G. Prier, P. Reiher, Attacking DDoS at the source international conference on network protocols. pp. 312- 321 ,(2002) , 10.1109/ICNP.2002.1181418