Implementation of Intelligent Techniques for Intrusion Detection Systems

نویسندگان

  • Sahar Selim Fouad
  • Taymoor M. Nazmy
  • Mohamed Hashem
  • Mohamed Hashem Abdel-Aziz
چکیده

II Acknowledgements Praise is to Allah and gratitude is given where it is due most to Allah. So with genuine humility, I acknowledge the aid of Allah. My deepest gratitude and sincerest appreciation to Prof. Dr. Mohamed Hashem Abdel-Aziz, for his continuous encouragement and enlightening advice and helpful advices, that helped me throughout this work. I feel greatly indebted to Prof. Dr. Taymoor M. Nazmy for his dynamic efforts, sincere guidance and continuous support without which this work would have never seen the light. Finally, I cannot sufficiently express my gratitude to my family; my parents, my sisters, my dearest friend Manal Mohsen whose love, support, guidance, and encouragement through the years have thoroughly equipped me for life, and my son Abdel Rahman, who makes it all worthwhile. Abstract With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. New security failures are discovered everyday and there are a growing number of bad-intentioned people trying to take advantage of such failures. Intrusion detection is a critical process in network security. Intrusion Detection Systems (IDS) aim at protecting networks and computers from malicious network-based or host-based attacks. Different soft-computing based methods have been proposed in recent years for the development of intrusion detection systems. Most current approaches to intrusion detection involve the use of rule-based expert systems to identify indications of known attacks. Artificial neural networks and decision trees provide the potential to identify and classify network activity. Most of the previous systems have some deficiencies. Some drawbacks of previous Intrusion detection systems (IDSs) are that they are unable to detect new attacks that are never seen before. Most of these systems don't identify the attack type but only specify whether the given network data is normal or attack. One of the drawbacks of IDSs that are signature-based is that they can only detect known attacks while all new unknown attacks will go unnoticed until the system is updated to be able to detect them. This thesis proposes a hybrid intelligent intrusion detection system to improve the detection rate for known and unknown attacks. The introduced system has the capability to learn fast, enhanced capability of detection of new unidentified attacks, and alarming the system administrator of these unseen before attacks. Unlike other systems that have one level of detection, the proposed system has three levels of detection. The first level …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Network Intrusion Detection System Using Genetic Algorithm Ppt

Intrusion Detection Systems (IDSs) detects the network factor for traditional SNORT (Network Based Intrusion. Detection Using Genetic Algorithms for intrusion detection has proven to be an implementation method. Section IV. Designing of On Line Intrusion Detection System Using Rough Set Theory and Q Evaluation of Rough Set Theory Based Network Traffic Data Classifier Using Traffic Data Classifi...

متن کامل

A Novel Intrusion Detection Systems based on Genetic Algorithms-suggested Features by the Means of Different Permutations of Labels’ Orders

Intrusion detection systems (IDS) by exploiting Machine learning techniques are able to diagnose attack traffics behaviors. Because of relatively large numbers of features in IDS standard benchmark dataset, like KDD CUP 99 and NSL_KDD, features selection methods play an important role. Optimization algorithms like Genetic algorithms (GA) are capable of finding near-optimum combination of the fe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011