Study of Intrusion Detection Systems

Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of well-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors.

[1]  Andrés Marín López,et al.  Enhancing privacy and dynamic federation in IdM for consumer cloud computing , 2012, IEEE Transactions on Consumer Electronics.

[2]  Li-Yong Ren,et al.  Using data mining to discover signatures in network-based intrusion detection , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[3]  Wei-Pang Yang,et al.  A two-phase encryption scheme for enhancing database security , 1995, J. Syst. Softw..

[4]  Celia Li,et al.  Secure Routing for Wireless Mesh Networks , 2011, Int. J. Netw. Secur..

[5]  Ya-Fen Chang,et al.  An Improved User Authentication and Key Agreement Scheme Providing User Anonymity , 2011 .

[6]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[7]  You,et al.  Research and Development of P2P Worms , 2011 .

[8]  Zhou,et al.  An Enhanced Automated Signature Generation Algorithm for Polymorphic Malware Detection , 2010 .

[9]  Xenofontas A. Dimitropoulos,et al.  Creating realistic BGP models , 2003, 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, 2003. MASCOTS 2003..

[10]  Richard A. Kemmerer,et al.  State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..

[11]  Mohammad,et al.  A Learning Automata Based Area Coverage Algorithm for Wireless Sensor Networks , 2010 .

[12]  Hiang H Wang Secure Access Schemes in Mobile Database Systems , 2012 .

[13]  Wei-Pang Yang,et al.  Multilevel Secure Database Encryption with Subkeys , 1997, Data Knowl. Eng..

[14]  Li Lin,et al.  Balancing Trust and Incentive in Peer-to-Peer Collaborative System , 2007, Int. J. Netw. Secur..

[15]  Cheng-Chi Lee,et al.  A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography , 2005, Telecommun. Syst..

[16]  Mohamed Salah Bouassida Authentication vs. Privacy within Vehicular Ad Hoc Networks , 2011, Int. J. Netw. Secur..

[17]  Yingyou Wen,et al.  Passive Worm Propagation Modeling and Analysis , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).

[18]  Feng Du An Effective Pattern Matching Algorithm for Intrusion Detection , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[19]  Alec Yasinsac,et al.  Metadata for anomaly-based security protocol attack deduction , 2004, IEEE Transactions on Knowledge and Data Engineering.

[20]  Zheng Bao-yu,et al.  Mobility-Aware and Load Balancing Based Clustering Algorithm for Energy Conservation in MANET * , 2005 .

[21]  Min-Shiang Hwang,et al.  An efficient key assignment scheme for access control in a large leaf class hierarchy , 2011, Inf. Sci..

[22]  Sheng-Shih Wang,et al.  Securing Bluetooth Communications , 2012, Int. J. Netw. Secur..

[23]  Yuan-Cheng Lai,et al.  Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems , 2012, IEEE Communications Magazine.

[24]  I. Kononenko,et al.  INDUCTION OF DECISION TREES USING RELIEFF , 1995 .

[25]  G. Mohankumar Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks , 2010 .

[26]  Chun-Ta Li,et al.  Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments , 2008, Comput. Commun..

[27]  Yen-Ping Chu,et al.  An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks , 2009 .

[28]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[29]  Arthur B. Maccabe,et al.  The architecture of a network level intrusion detection system , 1990 .

[30]  Thiagarajan Hamsapriya,et al.  Statistical Segregation Method to Minimize the False Detections During DDoS Attacks , 2011, Int. J. Netw. Secur..

[31]  Qin Zhiguang,et al.  A Survey of E-Commerce Security , 2004 .

[32]  Abhinav Srivastava,et al.  Database Intrusion Detection using Weighted Sequence Mining , 2006, J. Comput..

[33]  Cheng-Chi Lee,et al.  A secure e-auction scheme based on group signatures , 2009, Inf. Syst. Frontiers.

[34]  Min-Shiang Hwang,et al.  An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks , 2010 .

[35]  Zhou Ming-tian,et al.  Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis , 2006 .

[36]  Wen-Guey Tzeng,et al.  A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding , 2012, IEEE Transactions on Parallel and Distributed Systems.

[37]  Dharma P. Agrawal,et al.  Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[38]  Bimal Kumar Mishra,et al.  Differential Epidemic Model of Virus and Worms in Computer Network , 2012, Int. J. Netw. Secur..

[39]  Wei-Pang Yang,et al.  A communication-efficient three-party password authenticated key exchange protocol , 2011, Inf. Sci..

[40]  Huang Houkuan,et al.  An evolving intrusion detection system based on natural immune system , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..

[41]  Cheng-Chi Lee,et al.  Extension of authentication protocol for GSM , 2003 .

[42]  Vinayak Ashok Bharadi,et al.  Performance Comparison of DCT and VQ Based Techniques for Iris Recognition , 2010 .

[43]  Min-Shiang Hwang,et al.  DoS-resistant ID-based password authentication scheme using smart cards , 2010, J. Syst. Softw..

[44]  Min-Shiang Hwang,et al.  A Secure LITESET Scheme , 2004, IEICE Trans. Inf. Syst..

[45]  Ali Moeini,et al.  NFIDS: a neuro-fuzzy intrusion detection system , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.

[46]  Dinesh Kumar Saini,et al.  SEIRS epidemic model with delay for transmission of malicious objects in computer network , 2007, Appl. Math. Comput..

[47]  Guanling Chen,et al.  Simulating non-scanning worms on peer-to-peer networks , 2006, InfoScale '06.

[48]  B. B. Gupta,et al.  ANN Based Scheme to Predict Number of Zombies in a DDoS Attack , 2012, Int. J. Netw. Secur..

[49]  Fangwei Wang,et al.  Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks , 2010, Int. J. Netw. Secur..

[50]  Zhou Di,et al.  Feature representation and selection in malicious code detection methods based on static system calls , 2011 .

[51]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[52]  Yuan-Cheng Lai,et al.  Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems , 2012, Int. J. Netw. Secur..

[53]  Peng Liu,et al.  Towards Database Firewalls , 2005, DBSec.

[54]  Ming Yin,et al.  A new study in encryption base on fractional order chaotic system , 2008, 2008 International Conference on Communications, Circuits and Systems.

[55]  Nāgārjuna,et al.  A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding , 2014 .

[56]  Yuh-Jye Lee,et al.  Anomaly Detection via Online Oversampling Principal Component Analysis , 2013, IEEE Transactions on Knowledge and Data Engineering.