Descriptive analysis of Hash Table based Intrusion Detection Systems

Security and the confidentiality during the data transfer are the important metric in the network design. A group of sequential actions to assure the data confidentiality refers the intrusion. Intrusion in network gathers the information related to unauthorized access, and the exploitation of several vulnerabilities raised by attacks. This paper presents the detailed survey of strategies involved in the implementation of Intrusion Detection Systems (IDS) in the network. The survey categorized into five phases namely, IDS, data mining based IDS, multi-agent based IDS, Distributed Hash Table (DHT), and Internet Protocol (IP) based hash table. First phase discusses the structure of IDS with machine learning techniques such as Bayesian classifier, knowledge based, etc. Second, a data mining based IDS conveys how the reliability and security of IDS are improved compared to previous IDS. In the third phase, multi agent based IDS presents the status of coordination issues, false alarm rates and detection rates on application of multiple agents. Finally, a hash table mechanisms (Distributed Hash Table (DHT) & Internet Protocol (IP) based hash table) into the network to improve the matching efficiencies and computational speed. This survey conveys the difficulties in the traditional methods, namely, storage overhead, less matching efficiency, and adaptive nature (dynamically updating of hash tables) and false positive rates. The prediction of attackers or mis-behaving requests and the construction of adaptive reputation constitutes the main problems in IDS that lead to less efficiency. The observation from the survey lead to the stone of extension of Distributed Hash Table (DHT) with fuzzy based rules in order to overcome the difficulties in traditional research works.

[1]  Vladimir Krylov,et al.  DDoS Attack and Interception Resistance IP Fast Hopping Based Protocol , 2014, ArXiv.

[2]  Ing-Ray Chen,et al.  Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.

[3]  Wei Liu,et al.  Decentralized Multi-Agent System-Based Cooperative Frequency Control for Autonomous Microgrids With Communication Constraints , 2014, IEEE Transactions on Sustainable Energy.

[4]  Lam-for Kwok,et al.  Adaptive non-critical alarm reduction using hash-based contextual signatures in intrusion detection , 2014, Comput. Commun..

[5]  H. Jonathan Chao,et al.  FlashTrie: Beyond 100-Gb/s IP Route Lookup Using Hash-Based Prefix-Compressed Trie , 2012, IEEE/ACM Transactions on Networking.

[6]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[7]  H. Jonathan Chao,et al.  High-Throughput and Memory-Efficient Multimatch Packet Classification Based on Distributed and Pipelined Hash Tables , 2014, IEEE/ACM Transactions on Networking.

[8]  Nei Kato,et al.  Intrusion detection system (IDS) for combating attacks against cognitive radio networks , 2013, IEEE Network.

[9]  Nor Badrul Anuar,et al.  An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..

[10]  Mohammad Khubeb Siddiqui,et al.  Analysis of KDD CUP 99 Dataset using Clustering based Data Mining , 2013 .

[11]  Akhilesh Tiwari,et al.  A Novel Data Mining based Hybrid Intrusion Detection Framework , 2014 .

[12]  S. A. Joshi,et al.  Network Intrusion Detection System (NIDS) based on Data Mining , 2013 .

[13]  Mohammad M. Masud,et al.  Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement , 2015, Comput. Secur..

[14]  Timothy W. Finin,et al.  A Knowledge-Based Approach to Intrusion Detection Modeling , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[15]  K. Venkataramana,et al.  Multi-agent Intrusion Detection and Prevention System for Cloud Environment , 2012 .

[16]  Angelos D. Keromytis,et al.  A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS , 2011, ICISS.

[17]  Shahbaz Akhtar Abid,et al.  Exploiting 3D Structure for Scalable Routing in MANETs , 2013, IEEE Communications Letters.

[18]  John R. Williams,et al.  Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining , 2012, PAISI.

[19]  Feng Zhao,et al.  CSR: Classified Source Routing in Distributed Networks , 2018, IEEE Transactions on Cloud Computing.

[20]  Malik Sikander Hayat Khiyal,et al.  Analysis of Machine Learning Techniques for Intrusion Detection System: A Review , 2015 .

[21]  Karl Henrik Johansson,et al.  Distributed real-time fault detection and isolation for cooperative multi-agent systems , 2012, 2012 American Control Conference (ACC).

[22]  Byung kwan Lee,et al.  An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics against Network Attacks , 2014, Future Gener. Comput. Syst..

[23]  Shingo Mabu,et al.  An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[24]  Francisco Herrera,et al.  On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems , 2015, Expert Syst. Appl..

[25]  Josep Domingo-Ferrer,et al.  Discrimination prevention in data mining for intrusion and crime detection , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[26]  Alexis Olivereau,et al.  D-HIP: A distributed key exchange scheme for HIP-based Internet of Things , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[27]  Reza Azmi,et al.  MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach , 2014, Eng. Appl. Artif. Intell..

[28]  Rodolfo da Silva Villaça,et al.  A Similarity Search System Based on the Hamming Distance of Social Profiles , 2013, 2013 IEEE Seventh International Conference on Semantic Computing.

[29]  Hesham Altwaijry,et al.  Bayesian based intrusion detection system , 2012, J. King Saud Univ. Comput. Inf. Sci..

[30]  Dijiang Huang,et al.  NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.

[31]  Mahdi N. Al-Ameen,et al.  ReDS: A Framework for Reputation-Enhanced DHTs , 2012, IEEE Transactions on Parallel and Distributed Systems.

[32]  Elena Navarro,et al.  Model-driven engineering techniques for the development of multi-agent systems , 2012, Eng. Appl. Artif. Intell..

[33]  M. Tech,et al.  RIHT: A Novel Hybrid IP Traceback Scheme , 2014 .

[34]  Dong Hoon Lee,et al.  Scalable signaling protocol for Web real-time communication based on a distributed hash table , 2015, Comput. Commun..