Statistical Pattern Recognition Techniques for Intrusion Detection in Computer Networks Challenges and Solutions
نویسنده
چکیده
Intrusion Detection Systems (IDS) aim at detecting and possibly preventing the execution of attacks against computer networks, thus representing a fundamental component of a network defence-indepth architecture. Designing an IDS can be viewed as a pattern recognition problem. Pattern recognition techniques have been proven successful in learning concepts from example data and constructing classifiers that are able to classify new data with high accuracy. In network intrusion detection the main objective is to design a classifier that is able to distinguish between normal and attack traffic, therefore several researchers have used statistical pattern recognition and related techniques to accomplish this task showing promising results. We explore several aspects of the application of statistical pattern recognition to network intrusion detection from a practitioner point of view. Our intent is to point out significant challenges and possible solutions related to designing statistical pattern classification systems for network intrusion detection. In particular, we discuss three problems: a) Learning from unlabeled traffic; b) Learning in adversarial environment; c) Operating in adversarial environment. Because of the difficulties in constructing labeled datasets of network traffic, unlabeled learning techniques have recently been proposed to construct anomaly-based network IDS. In this case, the traffic used for learning is usually directly extracted from the live network to be protected and does not undergo any labeling process. Unfortunately, learning from unlabeled data is inherently difficult. As a consequence unlabeled anomaly IDS suffer from a relatively high number of false positives. We propose a new unlabeled anomaly IDS based on a modular Multiple Classifier System (MCS), and show that the proposed approach improves the accuracy performance compared to “monolithic” IDS proposed by other researchers. As the network traffic used for training unlabeled IDS is directly extracted from I
منابع مشابه
EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation (DA) that can reduce the number of transmissions. Two main challenges for DA are: (i)...
متن کاملAlert correlation and prediction using data mining and HMM
Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...
متن کاملA Review of Intrusion Detection Defense Solutions Based on Software Defined Network
Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملA hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007