MMDS: Multilevel Monitoring and Detection System

Size: px
Start display at page:

Download "MMDS: Multilevel Monitoring and Detection System"

Transcription

1 MMDS: Multilevel Monitoring and Detection System D. Dasgupta, J. Gomez, F. Gonzalez, M. Kaniganti, K. Yallapu, R. Yarramsettii Intelligent Security Systems Research Laboratory Division of Computer Science University of Memphis Memphis, TN-3852 Contact Gomez and Gonzalez are also assistant professors at Universidad Nacional de Colombia Abstract The paper presents an agent-based approach for monitoring and detecting different kinds of attacks in wireless networks. The long-term goal of this research is to develop a self-adaptive system that will perform real-time, monitoring, analysis, detection, and generation of appropriate responses to intrusive activities. This multi-agent architecture, which supports necessary agent interactions, uses fuzzy decision support system to generate rules for different attacks by monitoring parameters at multiple levels. The system is able to operate in a wireless network, detect and act in response to events in real-time, according to its broad decision objectives and security policies. Introduction Wireless LANs are in growing use and changing the landscape of computer networking. With the increased usage of wireless LANs, network security has become a major issue [5,6]. As, Wired Equivalent Privacy (WEP) has been proved vulnerable to attacks [], it is necessary to monitor the activities of the wireless LAN. Network probes or scans attempt to discover vulnerabilities and network probes are attempts to find open doors for future attacks if the network probe returns positive results for the hacker. This work is motivated by the fact that most existing intrusion detection systems (IDSs) fail to detect many cyber attacks because they lack intelligent techniques to make correct decisions in detecting distributed attacks [2,4]. One way to build intelligent decision-making systems to use in intrusion detection relies on learning the typical user/application behavior from a set of normal (positive) data [3]. By normal, we mean usage data that have been collected while no cyber attacks have taken place. However, the notion of normalcy in computer and network usage is rarely static but dynamic in nature. This means that the modeling of behavior must be elastic, or adapt to the normal fluctuations of the usage with time. Our current work focuses on anomaly detection in ad-hoc and infrastructure wireless networks (explained in detail in later sections). The security features usually provided by wireless networks include Wired Equivalent Privacy (WEP), Medium Access Control (MAC) filtering, and disabling the Service Set IDentification (SSID) broadcast. The security capabilities of each of these features are explained below. Enabling WEP WEP was introduced in wireless networks as a security measure in order to prevent the access of network resources by using similar wireless LAN equipment and to prevent eavesdropping on the network [4]. MAC filtering MAC filtering is the process of configuring an access point with a list of MAC addresses that will be allowed (or not allowed) to gain access to the rest of the network.

2 SSID broadcast SSID is associated with the access point. It is the network name by which the access point is identified. The access point sends beacon packets at regular intervals of time so that the mobile nodes can know the existence of the access point. 2 MMDS Security Agent Architecture We developed a multi-agent system (called MMDS), which uses intelligent decision support modules for robust intrusion detection. The MMDS (Multi-level Monitoring and Detection System) provides a hierarchical security agent framework, where a security node consists of four different agents (Manager agent, Monitor Agent, Decision Agent, and Action Agent) as shown in Figure. However, the activities of these agents are coordinated through the Manager Agent during sensing, communicating, and generating responses. Each agent performs a unique function (in coordination) to address various security issues of the monitored environment. User Interaction Scenario Manager Start 2 Monitor Anomaly Detected Decision 3 4 TARGET SYSTEM Diagnosis and Recommendation GIDO s Objects Action 5 Figure : MMDS Security Agent Architecture The Decision Agent consists of a fuzzy inference engine, which can take a robust decision in case of any abnormalities/intrusions. Since the difference between the normal and abnormal activities is not distinct, but rather fuzzy, so the purpose of a Fuzzy system is to provide imprecise and heuristic knowledge. In our current implementation, the action agent reports the state of the monitored environment in IDMEF (Intrusion Detection Message Exchange Format) format. Accordingly, the action agent generates alerts, heartbeats, etc. and that represents intrusion/ anomalous state, diagnosis, and recommends actions. The purpose is to send these objects to other system management devices in order to take necessary action, which may include: killing a process, disabling the access to a user who is a potential intruder, alerting the administrator about the intrusion, etc. 2. Fuzzy Decision Engine A Fuzzy system is based on the concept of fuzzy logic. In fuzzy logic, objects can belong to a set and cannot belong to the set at the same time. Fuzzy sets define the linguistic notions in fuzzy logic, and membership functions define the truth-value of such linguistic expressions. Table shows the difference between classic sets and fuzzy sets.

3 FUZZY SETS In fuzzy sets, an object can partially be in a set. The membership degree takes values between 0 and. means entirely in the set, 0 means entirely no in the set, other values means partially in the set. CLASSIC SETS In classic sets, an object is entirely in a set or is not. The membership degree takes only two values: 0 or. means entirely in the set, 0 means entirely outside the set. Other values are not allowed. Table : Differences between Fuzzy sets and Classic sets The degree of membership, of each object in the universe of discourse to a fuzzy set, defines a function where the universe of discourse is the domain, and the interval [0,] is the range. That function is called membership function. Also, a function between the universe of discourse and the interval [0-] can be used as a membership function for some fuzzy set. Figure 2 shows the most used membership function, the triangular membership function x Universe of discourse Figure 2: Triangular membership function for a fuzzy set Usually, the universe of discourse is normalized between 0.0 and.0. A fuzzy space, collection of fuzzy sets, has to be defined for each monitored parameter and for each deviation indicator. A fuzzy space is shown in Figure Low Medium low Medium Medium High High Figure 3: Fuzzy space An atomic fuzzy expression is an expression of the form: Variable is [not] fuzzyset Where, variable is a variable that takes values in the universe of discourse, and fuzzyset is the fuzzy set name that has been defined by a fuzzy membership function. The truth-value is the variable membership degree to the fuzzy set. Therefore, truth-values are expressed by a number between 0 and, where 0 means entirely false and means entirely true, other values means partially true. For each classical logic operator (and, or, negation), there is a common fuzzy logic operator:

4 p AND q = min{p, q} p OR q = max{p, q} NOT p =.0-p Fuzzy rules [7] have the form: IF fuzzy predicate THEN consequent Where fuzzy predicate is a predicate that uses fuzzy logic operators and atomic fuzzy expressions. Rules examples: IF x is HIGH and y is LOW THEN action3 IF x is MEDIUM and y is HIGH THEN action2 To infer a conclusion using a set of fuzzy rules, the following algorithm is used:. Evaluate the antecedent of each rule over the deviation of parameters. 2. Select a rule with the biggest antecedent truth-value. 3. The action to take is the consequent of such rule. Inference example: Rules: R: IF x is HIGH and y is LOW THEN action3 R2: IF x is MEDIUM HIGH and y is MEDIUM THEN action3 R3: IF x is MEDIUM and y is MEDIUM LOW THEN action Variables values: x is 0.7 and y is 0.3 Degree of Membership: x in HIGH is 0.2, x in MEDIUM HIGH 0.7, and, x in MEDIUM is 0.3 y in LOW is 0.4, y in MEDIUM LOW is 0.8, and, y in MEDIUM is 0.4 Rules truth values: R = 0.2, R2 = 0.4, and, R3 = 0.3 Chosen Rule: R3 Conclusion: action3 As the difference between the normal and the abnormal activities are not distinct, but rather fuzzy, this module can reduce the false signal in determining intrusive activities. The purpose of this component is to use imprecise and heuristic knowledge to describe the state of the system as normal, or as a specific attack (if the attack is known) or just as an attack (if the attack is unknown). The imprecise knowledge is represented using fuzzy logic; this allows representing vague concepts as small, high, etc. The fuzzy rules are specified in a XML file. The format of this file is defined by the following DTD (Document Type Definition): <! DOCTYPE knowledge [ <! ELEMENT knowledge ( fuzzyrule )*> <! ELEMENT fuzzyrule if then> <! ELEMENT if CDATA> <! ELEMENT then CDATA> ]> This is an example rules file: <? xml version=".0? > <!-- fuzzy controller test --> <knowledge> <rule> <if>local_received_packets is not high</if> <then>record-type is normal</then> <confidence>.0</confidence>

5 </rule> <rule> <if>local_sent_bytes is medium-high or CPU_USERS is not low</if> <then>record-type is sshhack</then> <confidence>.0</confidence> </rule> <rule> <if>local_sent_bytes is high</if> <then>record-type is nmap</then> <confidence>.0</confidence> </rule> </knowledge> The <if> part in rules is a fuzzy logic expression with priority operators, i.e., the operator with bigger priority is evaluated first than others with smaller precedence. Fuzzy engine uses the priorities shown in Table 2. OPERATOR PRECEDENCE Parenthesis 4 NOT 3 AND 2 OR Table 2: Priorities used by the Fuzzy rule evolver Therefore, operator NOT is evaluated before operators AND, and OR. Spaces, sets, and variables have to be defined in the spaces and variables files that the fuzzy controller uses. Also, for each atomic expression (<var> is [not] set), the fuzzy set should belong to the fuzzy space used by the variable, or else, the system will complain, and the fuzzy controller will not run. The <then> part is a string in double quotes that contains the kind of anomaly found, the explanation text, and the suggested recommendation. These elements have to be divided by a comma and put in the string in that order. 2.2 Training Fuzzy System An expert can specify the rules for the fuzzy decision system manually. However, this can be time consuming and, in some cases, very difficult. A more interesting option is to generate the rules automatically, using an algorithm that learns them from the data. MMDS uses a genetic algorithm that evolves fuzzy rules that are able to classify correctly a set of training data. The genetic algorithm used is a parameter free version proposed in [3]. 3 Wireless Set up, Experiments and Results 3. Wireless Network The experimentation is performed on both the Ad-hoc network and the Infrastructure network. Brief description on these networks follows: Ad-hoc Network: It is a peer-to-peer wireless network. Each computer with a wireless interface can communicate directly with all of the others.

6 Infrastructure Network: Uses an access point (AP) for communication in the wireless network, Stations must associate with an access point to be connected and obtain network services. Accordingly, all mobile stations are required to be within the range of the access point and the access point being connected to the wired network. Thus, in an infrastructure network, it is possible to use both the wired and the wireless networks together. Figure 4 shows an example environment of an infrastructure network. Figure 4: Wireless Infrastructure Network Structure 3.2 Attack Generation Details Three types of attacks are performed on the wireless networks. These attacks are described in two sections below. The first section describes SSH and NMAP attack and how the fuzzy detector system is able to detect them. The second section provides details of the MAC address Spoofing in the wireless network and related results on detection SSH and NMAP Attacks One set of experiments is conducted using two wireless nodes communicating with each other in ad-hoc network. The detection system (MMDS) is loaded on a machine, which monitors the other machine. The other set of experiments uses an infrastructure network. In this case, the wireless nodes are monitored from wired nodes with the help of a base station (access point). MMDS is run on one of the wired machines. The network is conformed by a set of wired computers, access points connected to them and wireless mobile nodes. MMDS is allowed to collect data for several hours from the WLAN using MMDS. Monitoring involves the collection of various system parameters regularly as data stream. In the experimentation reported here, the parameters shown in Table 3 are monitored. Network Level LOCAL_SENT_BYTES LOCAL_RECEIVED_BYTES LOCAL_SENT_PACKETS LOCAL_RECEIVED_PACKETS REMOTE_SENT_BYTES REMOTE_RECEIVED_BYTES REMOTE_SENT_PACKETS REMOTE_RECIEVED_PACKETS Process Level PROCESSES PROCESSES_ROOT PROCESSES_USER PROCESSES_BLOCKED PROCESSES_RUNNING PROCESSES_WAITING PROCESSES_ZOMBIED

7 User Level LOGINS FAILED_LOGINS REMOTE_LOGINS CPU_USERS System Level USED_PHYSICAL_RAM USED_SWAP_RAM Table 3: Parameters Monitored by MMDS at various levels We divide the collection of data in to two phases: Collecting data in normal conditions: The monitored computer is kept under normal usage. Therefore, this data corresponds to the normal behavior of the system. The profile of the normal is given by either minimum-maximum values or by average-standard deviation of the monitored parameters. This profile is then saved to a file. Also, a sample of this data is labeled as normal for use in the training process. Collecting data under attack: The monitored computer is attacked from another computer, in order to generate a collection of data records that represent the abnormal behavior. In this experimentation, we ran the following two attacks: SSHHACK: This attack tries to guess the password of a user in the trained system. NMAP: This attack tries to scan for the open ports in the trained system. The data is labeled based on the attack performed. In summary, we create a training dataset with records for normal behavior and for the attacks SSHHACK and NMAP Preprocessing We normalize the dataset using the preprocessing tool provided in MMDS. In the normalization process, each monitored parameter is normalized between 0.6 and 0.84 according to the maximum and minimum values observed in the normal profile. For each monitored parameter, we assign the following a fuzzy space. Figure 5 shows a fuzzy space that we used. Figure 5: Fuzzy Space Fuzzy Rule Generation We used a parameter-free genetic algorithm [3] where crossover and mutation rates are not set rather evolve with the population. Each genetic algorithm run was initialized with a random chromosome population of 200 individuals, with length between one and six genes, and the maximum number of iterations was fixed at 200. In this way, the speed up of the evolutionary process appears to be significant Offline Testing Results A ten-fold testing strategy was employed [2], that is, the data set was partitioned into ten randomly chosen subsets, and each subset was used as a testing set for the fuzzy classifier trained with the remaining subsets. The score of the classifier (correctly classified samples / sample size) was calculated as the average score of the 0 tests.

8 The Receiver Operating Characteristics (ROC) Curve is used to exhibit the tradeoff between false alarm rate and detection rate during the attack period (as shown in Figure 6). It can be noted from the Roc curve that for a false alarm rate of.0 and above, the detection rate is almost 00%. Roc Curve Detection Rate (%) False Alarm Rate (%) Figure 6: ROC Curve exhibits the performance of the system Online Testing Figures 7 and 8 show the snapshots of MMDS console (GUI) during the two attacks, SSHHACK and NMAP, respectively. In Figure 7, we can see that as the SSHHACK starts, the system senses the possibility of SSHHACK but with low confidence (first line under Decision frame). As the attack progresses, the confidence level exceeds the predefined threshold (0.5) indicating that the attack is underway. Figure 7: Snapshot showing the rule for SSHHACK attack

9 Figure 8: Snapshot showing the rule for NMAP attack In Figure 8, similar results are also reported with higher confidence during the NMAP attacks MAC Address Spoofing in wireless infrastructure network Experimental Settings The experimental environment consists of a Linksys access point (model WAP). All the security features described in the introduction section (such as WEP, MAC filtering, and disabling SSID) are enabled on the access point during the experiments. Four legitimate mobile nodes are assigned to communicate with the access point. We have specified the MAC addresses of these four mobile nodes in the MAC filtering list of the access point (as shown in Figure 9). Thus the access point allows only these four clients communicate with the network if they provide the correct encryption key (i.e.; authorized). Figure 9: MAC authorization list assigned by the access point

10 Attack Conditions It is known that the security in 802. networks is weak. Studies show that it is possible to break the WEP key and it appears to be weak []. In our experiments, we have simulated MAC spoofing attack, where the attacker machine (windows XP) gets the WEP key by running Airsnort software [7]. The attacker also needs to know the MAC address of one of the legitimate node by passively sniffing the network. In our case, we used Ethereal tool for sniffing. The attack is launched against a legitimate node with the MAC address 00:02:2D:2A:AA:AD. The attacker machine uses a tool called Spoof MAC (SMAC) to change its MAC address to 00:02:2D:2A:AA:AD and gains access to the network. The wireless network environment used in the experiments and the sequence of steps used to launch MAC spoofing attack is shown in Figure 0. Attacker Machine 00:02:2D:5:7F:3C AP 00:02:2D:2A:AB:5C 00:02:2D:2A:AB:6D 00:02:2D:2A:AA:AD Running Wellenreiter and Ethereal to monitor the network Try to capture the network on each wireless node Monitor the sequence numbers obtained from the captured packets Runs Airsnort to get the key from the Wireless LAN Sniff the Wireless cloud to get the MAC address of one of the legitimate nodes using Ethereal or Wellenreiter Use SMAC tool to change its own MAC address to that of the legitimate nodes MAC address Figure 0: Experimental Environment illustrating four authorized wireless machines associated with the access point (AP) and the machine launching attack Data Processing While the attack is being launched, we are able to monitor the wireless network from one of the wireless nodes. This is performed with the help of Wellenreiter [5] and Ethereal [6] tools. The data thus captured is processed to get the traffic going to and from the victim machine. The sequence number field of the packets so captured is monitored for the experiment. The attack is launched twice to collect two different data sets, one is used as the training data to train the detection system and the other is testing data to detect how far the fuzzy classifier is able to detect such attacks. The training and testing sets are created using a window size of four consecutive values for capturing temporal behavior. The training data set contains 2800 records and the testing data set is made up of 000 records that are being used by the fuzzy rule generator.

11 Results The results show the efficiency of the fuzzy detection system in detecting the abnormalities. Figure and Figure2 show the deviation in sequence numbers in the training and testing phases respectively. From Figure3, it is clear that the fuzzy detection system is able to detect most of the abnormalities correctly during the testing phase. Training Data Sequence Number Time Figure : The sequence number of the entire Training set plotted against time Testing Data.2 Sequence Number Time Figure 2: The sequence number of the entire Testing set plotted against time

12 Deviation Level 2705 Time Figure 3: Deviation level produced by Fuzzy Classifier during testing phase indicating the abnormality in sequence number for the entire testing data set Figure4a shows the change in sequence number between 300 and 700 seconds. It can be seen that the attack occurred between 300 to 700 seconds. The fuzzy decision support system was also able to correctly detect the abnormality in the sequence number of the packets. This is depicted in Figure4b Sequence Number Time Figure 4a: Observed change in sequence number in wireless traffic during testing phase between 300 and 700 seconds

13 Deviation Level Time Figure 4b: Deviation level produced by Fuzzy Classifier during testing phase indicating the abnormality in sequence number between 300 and 700 seconds 4 Discussion The paper describes the use of an agent based multilevel monitoring system called MMDS. It appears to be a very useful tool for intrusion detection in both wired and wireless networks. We have tested MMDS with some simulated attacks in wireless network. As was shown, MMDS was able to detect these attacks as they are launched. When the attack initiates, MMDS was able to detect the abnormality and subsequently, the fuzzy decision system could classify such attack based on its training. The MMDS console (GUI components) allows viewing the changes in various parameters graphically. This gives a better understanding of the environment and the various attacks. The current implementation of MMDS only allows offline training; adding the ability of training online will be a useful extension to MMDS. The initial results are encouraging but it is necessary to test the MMDS with a broader set of attacks. Our future work includes the addition of other decision algorithms such as, classifier systems and sophisticated anomaly detection techniques [0]. Acknowledgements: This work was funded by the Defense Advanced Research Projects Agency (contract no. F ). References:. A. Stubblefield, J. Ioannidis, A. Rubin. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. ATT Labs Technical Report, TD4ZCPZZ, Revision 2, August 2, D. Dasgupta and F. Gonzalez. An Intelligent Decision Support System for Intrusion Detection and Response. In the Lecture Notes in Computer Science (publisher: Springer-Verlag) as the proceedings of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS), May 2-23, 200, St.Petersburg, Russia.

14 3. E. Eskin. Anomaly detection over noisy data using learned probability distributions. In Proc. 7 th International Conf. on Machine Learning, pages Morgan Kaufmann, San Francisco, CA. 4. T. Lane. Machine Learning Techniques For The Computer Security. PhD thesis, Purdue University. 5. L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine. Vol. 3, no.6, November/December Y. Zhang and W. Lee. Intrusion detection in wireless ad hoc networks. ACM MOBICOM, J. Gomez and D. Dasgupta. Evolving Fuzzy Rules for Intrusion Detection. In the proceedings of the Information Assurance Workshop, West Point, NY, June 7-9, D. Dasgupta and G. Dunlap. An Administrative Tool for Distributed Security Task Scheduling. In the proceedings of the Third Annual International Systems Security Engineering Association Conference held on March 3-March 5, D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez, R. Yarramsetti, G. Dunlap, M. Greaves. Cougaar based Intrusion Detection System (CIDS). CS Technical Report No. CS February D. Dasgupta and F. Gonzalez. An Immunity-Based Technique to Characterize Intrusions in Computer Networks. Published in the journal IEEE Transactions on Evolutionary Computation, Vol. 6, No. 3, June D. Dasgupta and H. Brian. Mobile Security Agents for Network Traffic Analysis. Published by the IEEE Computer Society Press in the proceedings of the second DARPA Information Survivability Conference and Exposition II (DISCEX-II) held on 3-4 June 200 in Anaheim, California. 2. T. Lim and W. Loh. A Comparison of Prediction Accuracy, Complexity, and Training Time of Thirty-Three Old and New Classification Algorithms. Technical Report, Department of Statistics, University of Wisconsin-Madison, No J. Gomez, and D. Dasgupta. Using Competitive Operators and a Local Selection Scheme in Genetic Search. Published in the proceedings of the Evolutionary Computation Conference GECCO02, Pablo Brenner, A technical tutorial on the IEEE 802. standard, (last accessed on April 25, 2003) 5. Wellenreiter. Wireless LAN Discovery and Auditing Tool, (last accessed on April 25, 2003) 6. Ethereal Network Analyzer, (last accessed on April 25, 2003) 7. Airsnort, (last accessed on April 25, 2003)

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks S. Balachandran, D. Dasgupta, L. Wang Intelligent Security Systems Research Lab Department of Computer Science The University of

More information

A Rule-Based Intrusion Alert Correlation System for Integrated Security Management *

A Rule-Based Intrusion Alert Correlation System for Integrated Security Management * A Rule-Based Intrusion Correlation System for Integrated Security Management * Seong-Ho Lee 1, Hyung-Hyo Lee 2, and Bong-Nam Noh 1 1 Department of Computer Science, Chonnam National University, Gwangju,

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

An Integrated Scheme for Intrusion Detection in WLAN +

An Integrated Scheme for Intrusion Detection in WLAN + An Integrated Scheme for Intrusion Detection in WLAN + Dong hil Kim, Seok Joo Koh and Sang Wook Kim Department of Computer Science, Kyungpook National University, Korea {dpkim, sjkoh, swkim}@cs.knu.ac.kr

More information

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp Questions Have you used a wireless local area network before? At home? At work? Have you configured a wireless AP before?

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

A Passive Approach to Wireless NIC Identification

A Passive Approach to Wireless NIC Identification A Passive Approach to Wireless NIC Identification Cherita Corbett Georgia Institute of Technology IEEE ICC 2006 June 13, 2006 Presentation Outline Motivation & Background Objective NIC Identification using

More information

Review on Data Mining Techniques for Intrusion Detection System

Review on Data Mining Techniques for Intrusion Detection System Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,

More information

New Collaborative Intrusion Detection Architecture Based on Multi Agent Systems

New Collaborative Intrusion Detection Architecture Based on Multi Agent Systems Journal of Communication and Computer 13 (2016) 1-10 doi:10.17265/1548-7709/2016.01.001 D DAVID PUBLISHING New Collaborative Intrusion Detection Architecture Based on Multi Agent Systems Mohssine EL AJJOURI,

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 3.134 ISSN (Online): 2348-4470 ISSN (Print) : 2348-6406 International Journal of Advance Engineering and Research Development Volume 1, Issue 11, November -2014

More information

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM Assosiate professor, PhD Evgeniya Nikolova, BFU Assosiate professor, PhD Veselina Jecheva,

More information

Approach Using Genetic Algorithm for Intrusion Detection System

Approach Using Genetic Algorithm for Intrusion Detection System Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-

More information

Authentication System

Authentication System A Biologically Inspired Password Authentication System Dipankar Dasgupta and Sudip Saha Center for Information Assurance University of Memphis Memphis, TN 38152 Outline Motivation Position Authentication

More information

Detecting & Eliminating Rogue Access Point in IEEE WLAN

Detecting & Eliminating Rogue Access Point in IEEE WLAN Detecting & Eliminating Rogue Access Point in IEEE 802.11 WLAN S.B.Vanjale, Amol K. Kadam, Pramod A. Jadhav Department of Computer Engg Bharati Vidyapeeth Deemed University College of Engineering Pune.

More information

DDoS Attacks Detection Using GA based Optimized Traffic Matrix

DDoS Attacks Detection Using GA based Optimized Traffic Matrix 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing DDoS Attacks Detection Using GA based Optimized Traffic Matrix Je Hak Lee yitsup2u@gmail.com Dong

More information

Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest

Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest Bhakti V. Gavali 1, Prof. Vivekanand Reddy 2 1 Department of Computer Science and Engineering, Visvesvaraya Technological

More information

A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection (Kohavi, 1995)

A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection (Kohavi, 1995) A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection (Kohavi, 1995) Department of Information, Operations and Management Sciences Stern School of Business, NYU padamopo@stern.nyu.edu

More information

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN ------------------- CHAPTER 4 DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN In this chapter, MAC layer based defense architecture for RoQ attacks in Wireless LAN

More information

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: 22-1 1. Intruders 2. Intrusion

More information

IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach

IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach International Journal of Network Security, Vol.17, No.6, PP.754-770, Nov. 2015 754 IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach Ghazaleh Javadzadeh 1, Reza Azmi 2 (Corresponding

More information

Intrusions Detection System Based on Ubiquitous Network Nodes

Intrusions Detection System Based on Ubiquitous Network Nodes Intrusions Detection System Based on Ubiquitous Network Nodes Lynda Sellami Djilali Idoughi Abderrahmane Baadache Department of Computer Science Laboratory of Applied Mathematics Laboratory of Modeling

More information

IJCSC Volume 4 Number 2 September 2013 pp ISSN

IJCSC Volume 4 Number 2 September 2013 pp ISSN Improving the performance of IDS using Genetic Algorithm Kuldeep Kumar, Ramkala Punia Computer Programmer, CCS Haryana Agriculture University, Hisar, Haryana *Teaching Associate, Deptt. of CSE, Guru Jambheshwar

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Research on Applications of Data Mining in Electronic Commerce Xiuping YANG 1, a 1 Computer Science Department,

More information

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004 Specification-based Intrusion Detection Michael May CIS-700 Fall 2004 Overview Mobile ad hoc networking (MANET) new area of protocols Some old networking solutions work (TCP/IP) but things change with

More information

CS-MARS Integration for Cisco Unified Wireless

CS-MARS Integration for Cisco Unified Wireless 9 CHAPTER A secure unified network, featuring both wired and wireless access, requires an integrated, defense-in-depth approach to security, including cross-network anomaly detection and correlation that

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

Analyzing Outlier Detection Techniques with Hybrid Method

Analyzing Outlier Detection Techniques with Hybrid Method Analyzing Outlier Detection Techniques with Hybrid Method Shruti Aggarwal Assistant Professor Department of Computer Science and Engineering Sri Guru Granth Sahib World University. (SGGSWU) Fatehgarh Sahib,

More information

Intelligent Risk Identification and Analysis in IT Network Systems

Intelligent Risk Identification and Analysis in IT Network Systems Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au

More information

Framework For Cloud Computing Networks Pdf

Framework For Cloud Computing Networks Pdf A Cooperative Intrusion Detection System Framework For Cloud Computing Networks Pdf of Intrusion Detection Systems proposed over the years. Cloud Computing Cloud Computing suffers from various network

More information

Chapter 5: Vulnerability Analysis

Chapter 5: Vulnerability Analysis Chapter 5: Vulnerability Analysis Technology Brief Vulnerability analysis is a part of the scanning phase. In the Hacking cycle, vulnerability analysis is a major and important part. In this chapter, we

More information

Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows

Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows S. Farzaneh Tabatabaei 1, Mazleena Salleh 2, MohammadReza Abbasy 3 and MohammadReza NajafTorkaman 4 Faculty of Computer

More information

Intrusion Detection System

Intrusion Detection System Intrusion Detection System Marmagna Desai March 12, 2004 Abstract This report is meant to understand the need, architecture and approaches adopted for building Intrusion Detection System. In recent years

More information

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

White Paper. Why IDS Can t Adequately Protect Your IoT Devices White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

The k-means Algorithm and Genetic Algorithm

The k-means Algorithm and Genetic Algorithm The k-means Algorithm and Genetic Algorithm k-means algorithm Genetic algorithm Rough set approach Fuzzy set approaches Chapter 8 2 The K-Means Algorithm The K-Means algorithm is a simple yet effective

More information

Managing Rogue Devices

Managing Rogue Devices Information About Rogue Devices, page 1 Configuring Rogue Detection (GUI), page 5 Configuring Rogue Detection (CLI), page 8 Information About Rogue Devices Rogue access points can disrupt wireless LAN

More information

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION. Abstract

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION. Abstract FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges, Associate Professor Rayford B. Vaughn, Associate Professor Department of Computer Science Mississippi State University

More information

Bayesian Learning Networks Approach to Cybercrime Detection

Bayesian Learning Networks Approach to Cybercrime Detection Bayesian Learning Networks Approach to Cybercrime Detection N S ABOUZAKHAR, A GANI and G MANSON The Centre for Mobile Communications Research (C4MCR), University of Sheffield, Sheffield Regent Court, 211

More information

SOFT COMPUTING TECHNIQUES FOR INTRUSION DETECTION. A Dissertation. Presented for the. Doctor of Philosophy. Degree. The University of Memphis

SOFT COMPUTING TECHNIQUES FOR INTRUSION DETECTION. A Dissertation. Presented for the. Doctor of Philosophy. Degree. The University of Memphis SOFT COMPUTING TECHNIQUES FOR INTRUSION DETECTION A Dissertation Presented for the Doctor of Philosophy Degree The University of Memphis Jonatan Gomez Perdomo August 2004 i Dedication This work is dedicated

More information

A Neuro-Fuzzy Classifier for Intrusion Detection Systems

A Neuro-Fuzzy Classifier for Intrusion Detection Systems . 11 th International CSI Computer Conference (CSICC 2006), School of Computer Science, IPM, Jan. 24-26, 2006, Tehran, Iran. A Neuro-Fuzzy Classifier for Intrusion Detection Systems Adel Nadjaran Toosi

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection CS419 Spring 2010 Computer Security Vinod Ganapathy Lecture 13 Chapter 6: Intrusion Detection Security Intrusion & Detection Security Intrusion a security event, or combination of multiple security events,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN 1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique

More information

A multi-step attack-correlation method with privacy protection

A multi-step attack-correlation method with privacy protection A multi-step attack-correlation method with privacy protection Research paper A multi-step attack-correlation method with privacy protection ZHANG Yongtang 1, 2, LUO Xianlu 1, LUO Haibo 1 1. Department

More information

Classification of Concept-Drifting Data Streams using Optimized Genetic Algorithm

Classification of Concept-Drifting Data Streams using Optimized Genetic Algorithm Classification of Concept-Drifting Data Streams using Optimized Genetic Algorithm E. Padmalatha Asst.prof CBIT C.R.K. Reddy, PhD Professor CBIT B. Padmaja Rani, PhD Professor JNTUH ABSTRACT Data Stream

More information

CHAPTER V KDD CUP 99 DATASET. With the widespread use of computer networks, the number of attacks has grown

CHAPTER V KDD CUP 99 DATASET. With the widespread use of computer networks, the number of attacks has grown CHAPTER V KDD CUP 99 DATASET With the widespread use of computer networks, the number of attacks has grown extensively, and many new hacking tools and intrusive methods have appeared. Using an intrusion

More information

IJESRT. [Dahiya, 2(5): May, 2013] ISSN: Keywords: AODV, DSDV, Wireless network, NS-2.

IJESRT. [Dahiya, 2(5): May, 2013] ISSN: Keywords: AODV, DSDV, Wireless network, NS-2. IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Performance Comparison of ADSDV and DSDV in MANET Brahm Prakash Dahiya Shaym Lal College,New Delhi, India brahmprakasd@gmail.com

More information

Overview of Security

Overview of Security Overview of 802.11 Security Bingdong Li Present for CPE 601 2/9/2011 Sources: 1 Jesse Walker (Intel) & 2. WinLab 1 Agenda Introduction 802.11 Basic Security Mechanisms What s Wrong? Major Risks Recommendations

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Evolution of Fuzzy Rule Based Classifiers

Evolution of Fuzzy Rule Based Classifiers Evolution of Fuzzy Rule Based Classifiers Jonatan Gomez Universidad Nacional de Colombia and The University of Memphis jgomezpe@unal.edu.co, jgomez@memphis.edu Abstract. The paper presents an evolutionary

More information

Securing a Wireless LAN

Securing a Wireless LAN Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

DUE TO advances in information-communication technology,

DUE TO advances in information-communication technology, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 36, NO. 3, JUNE 2006 559 Evolutionary Neural Networks for Anomaly Detection Based on the Behavior of a Program Sang-Jun Han

More information

NETWORK FAULT DETECTION - A CASE FOR DATA MINING

NETWORK FAULT DETECTION - A CASE FOR DATA MINING NETWORK FAULT DETECTION - A CASE FOR DATA MINING Poonam Chaudhary & Vikram Singh Department of Computer Science Ch. Devi Lal University, Sirsa ABSTRACT: Parts of the general network fault management problem,

More information

Identifying Stepping Stone Attack using Trace Back Based Detection Approach

Identifying Stepping Stone Attack using Trace Back Based Detection Approach International Journal of Security Technology for Smart Device Vol.3, No.1 (2016), pp.15-20 http://dx.doi.org/10.21742/ijstsd.2016.3.1.03 Identifying Stepping Stone Attack using Trace Back Based Detection

More information

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 Jinqiao Yu Department of Mathematics and Computer Science Illinois Wesleyan Univerisity P.O.Box 2900 Bloomington, IL 61701 Ramana

More information

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK Abinesh Kamal K. U. and Shiju Sathyadevan Amrita Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa

More information

Mapping Internet Sensors with Probe Response Attacks

Mapping Internet Sensors with Probe Response Attacks Mapping Internet Sensors with Probe Response Attacks John Bethencourt, Jason Franklin, and Mary Vernon {bethenco, jfrankli, vernon}@cs.wisc.edu Computer Sciences Department University of Wisconsin, Madison

More information

Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users

Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users ANT 2011 Dusan Stevanovic York University, Toronto, Canada September 19 th, 2011 Outline Denial-of-Service and

More information

A Virtual Laboratory for Study of Algorithms

A Virtual Laboratory for Study of Algorithms A Virtual Laboratory for Study of Algorithms Thomas E. O'Neil and Scott Kerlin Computer Science Department University of North Dakota Grand Forks, ND 58202-9015 oneil@cs.und.edu Abstract Empirical studies

More information

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April-2013 1492 Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE,

More information

Man in the middle. Bởi: Hung Tran

Man in the middle. Bởi: Hung Tran Man in the middle Bởi: Hung Tran INTRODUCTION In today society people rely a lot on the Internet for studying, doing research and doing business. Internet becomes an integral part of modern life and many

More information

Managing Rogue Devices

Managing Rogue Devices Finding Feature Information, page 1 Information About Rogue Devices, page 1 How to Configure Rogue Detection, page 6 Monitoring Rogue Detection, page 8 Examples: Rogue Detection Configuration, page 9 Additional

More information

Security Analysis of Common Wireless Networking Implementations

Security Analysis of Common Wireless Networking Implementations Security Analysis of Common Wireless Networking Implementations Brian Cavanagh CMPT 585 12/12/2005 The use of wireless networking to connect to the internet has grown by leaps and bounds in recent years.

More information

Intrusion Detection Using Data Mining Technique (Classification)

Intrusion Detection Using Data Mining Technique (Classification) Intrusion Detection Using Data Mining Technique (Classification) Dr.D.Aruna Kumari Phd 1 N.Tejeswani 2 G.Sravani 3 R.Phani Krishna 4 1 Associative professor, K L University,Guntur(dt), 2 B.Tech(1V/1V),ECM,

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

Classification Using Unstructured Rules and Ant Colony Optimization

Classification Using Unstructured Rules and Ant Colony Optimization Classification Using Unstructured Rules and Ant Colony Optimization Negar Zakeri Nejad, Amir H. Bakhtiary, and Morteza Analoui Abstract In this paper a new method based on the algorithm is proposed to

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud

More information

Home Computer and Internet User Security

Home Computer and Internet User Security Home Computer and Internet User Security Lawrence R. Rogers Version 1.0.4 CERT Training and Education Networked Systems Survivability Software Engineering Institute Carnegie Mellon University Pittsburgh,

More information

Engineering Swarm- Services CS

Engineering Swarm- Services CS Engineering Swarm- Services CS 294-97 Spring 2014 John Wawrzynek Adam Wolisz Technische Universitat Berlin UC Berkeley EECS Adjunct Lecture 01, Introduction 1 CS294-97, UC Berkeley Spring 14 Beacons Transmitted

More information

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Using Threat Analytics to Protect Privileged Access and Prevent Breaches Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers

More information

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional

More information

Requirements from the

Requirements from the Requirements from the collaborative Protection Profile for Network Devices Extended Package (EP) for Wireless Intrusion Detection/Prevention Systems (WIDS/WIPS) Version: 1.0 2016-10-06 National Assurance

More information

Detecting Protected Layer-3 Rogue APs

Detecting Protected Layer-3 Rogue APs Detecting Protected Layer-3 Rogue APs Authors: Hongda Yin, Guanling Chen, and Jie Wang Department of Computer Science, University of Massachusetts Lowell Presenter: Bo Yan Department of Computer Science

More information

Spoofing Detection in Wireless Networks

Spoofing Detection in Wireless Networks RESEARCH ARTICLE OPEN ACCESS Spoofing Detection in Wireless Networks S.Manikandan 1,C.Murugesh 2 1 PG Scholar, Department of CSE, National College of Engineering, India.mkmanikndn86@gmail.com 2 Associate

More information

Fuzzy Intrusion Detection

Fuzzy Intrusion Detection Fuzzy Intrusion Detection John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson Electrical and Computer Engineering Department Iowa State University Ames, IA, USA {jedicker,juslin,koukouso,julied}@iastate.edu

More information

International Journal of Research in Advent Technology, Vol.7, No.3, March 2019 E-ISSN: Available online at

International Journal of Research in Advent Technology, Vol.7, No.3, March 2019 E-ISSN: Available online at Performance Evaluation of Ensemble Method Based Outlier Detection Algorithm Priya. M 1, M. Karthikeyan 2 Department of Computer and Information Science, Annamalai University, Annamalai Nagar, Tamil Nadu,

More information

Intrusion Detection System with FGA and MLP Algorithm

Intrusion Detection System with FGA and MLP Algorithm Intrusion Detection System with FGA and MLP Algorithm International Journal of Engineering Research & Technology (IJERT) Miss. Madhuri R. Yadav Department Of Computer Engineering Siddhant College Of Engineering,

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations

Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Prateek Saxena March 3 2008 1 The Problems Today s lecture is on the discussion of the critique on 1998 and 1999 DARPA IDS evaluations conducted

More information

Multivariate Correlation Analysis based detection of DOS with Tracebacking

Multivariate Correlation Analysis based detection of DOS with Tracebacking 1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor

More information

Detecting MAC Spoofing Using ForeScout CounterACT

Detecting MAC Spoofing Using ForeScout CounterACT Detecting MAC Spoofing Using ForeScout CounterACT Professional Services Library Introduction MAC address spoofing is used to impersonate legitimate devices, circumvent existing security mechanisms and

More information

Role of Cross Layer Based Intrusion Detection System for Wireless Domain

Role of Cross Layer Based Intrusion Detection System for Wireless Domain Int. J. Communications, Network and System Sciences, 2012, 5, 81-85 http://dx.doi.org/10.4236/ijcns.2012.52010 Published Online February 2012 (http://www.scirp.org/journal/ijcns) 81 Role of Cross Layer

More information

Evolving SQL Queries for Data Mining

Evolving SQL Queries for Data Mining Evolving SQL Queries for Data Mining Majid Salim and Xin Yao School of Computer Science, The University of Birmingham Edgbaston, Birmingham B15 2TT, UK {msc30mms,x.yao}@cs.bham.ac.uk Abstract. This paper

More information

Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks. Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer

Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks. Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer The Beautiful World of IoT 06.03.2018 garcia@tk.tu-darmstadt.de

More information

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

A Configuration Protocol for Embedded Devices on Secure Wireless Networks A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)

More information

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended

More information

Wi-Fi Activity in Open Environments: Tools, Measurements, and Analyses. Thomas Claveirole Ph.D. Defense February 26, 2010

Wi-Fi Activity in Open Environments: Tools, Measurements, and Analyses. Thomas Claveirole Ph.D. Defense February 26, 2010 Wi-Fi Activity in Open Environments: Tools, Measurements, and Analyses Thomas Claveirole Ph.D. Defense February 26, 2010 Ana Cavalli Reviewer Prof. TÉLÉCOM & Management SudParis Thierry Turletti Reviewer

More information

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS David Murotake, (SCA Technica, Inc. Nashua NH, USA; david.murotak@scatechnica.com) Antonio Martin (SCA Technica, Inc., Nashua NH, USA;

More information

Wireless Network Security Fundamentals and Technologies

Wireless Network Security Fundamentals and Technologies Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #7 WiFi Security 1 Announcements Please do HW#2 in using the stable OMNET++ 4.6, not the beta version. Porting has proven difficult... Form project

More information

Flow-based Anomaly Intrusion Detection System Using Neural Network

Flow-based Anomaly Intrusion Detection System Using Neural Network Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

MULTIVARIATE ANALYSIS OF STEALTH QUANTITATES (MASQ)

MULTIVARIATE ANALYSIS OF STEALTH QUANTITATES (MASQ) MULTIVARIATE ANALYSIS OF STEALTH QUANTITATES (MASQ) Application of Machine Learning to Testing in Finance, Cyber, and Software Innovation center, Washington, D.C. THE SCIENCE OF TEST WORKSHOP 2017 AGENDA

More information