Insider threats are evolving constantly and misuse the granted resource access for various malicious activities. These insider threats make use of internal network flaws as the loop holes and are the root cause for data exfiltration and infiltration (Data leakage). Organizations are devising and deploying new solutions for analyzing, monitoring and predicting these insider threats. However data leakage and network breach problems still exist and are increasing day by day. This is due to multiple root accounts, top priority privileges, shared root access, shared file system privileges etc. In this paper a new Hybrid Intrusion Detection System (IDS) is developed to overcome the above stated problem. The objective of this research is to develop a Complex Event Processing (CEP) based Hybrid IDS that integrates the output of the Host IDS and Network IDS into the CEP Module and produces a consolidated output with higher accuracy. The overall deployment protects the internal information system without any data leakage by Stateful Packet Inspection. Multivariate Correlation Analysis (MCA) is used to estimate and characterize the normal behavior of the network and send the values to the CEP Engine which alerts in case of any deviation from the normal pattern. The performance of the proposed Hybrid IDS is examined using test bed with normal and various attack scenarios.
[1]
Christian W. Probst,et al.
Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques
,
2011,
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[2]
Hari Om,et al.
A hybrid system for reducing the false alarm rate of anomaly intrusion detection system
,
2012,
2012 1st International Conference on Recent Advances in Information Technology (RAIT).
[3]
Xiangjian He,et al.
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
,
2014,
IEEE Transactions on Parallel and Distributed Systems.
[4]
Alfonso Valdes,et al.
Next Generation Intrusion Detection Expert System (NIDES), Software Users Manual
,
1994
.
[5]
Sushil Jajodia,et al.
ADAM: Detecting Intrusions by Data Mining
,
2001
.
[6]
Sushil Jajodia,et al.
ADAM: a testbed for exploring the use of data mining in intrusion detection
,
2001,
SGMD.
[7]
Tao Xu,et al.
An intrusion detection approach inspired by biological memory cell
,
2012,
2012 International Conference on Computational Problem-Solving (ICCP).