A Survey on Secure Network: Intrusion Detection & Prevention Approaches

With the growth of the Internet and its potential, more and more people are getting connected to the Internet every day to take advantage of the e-Commerce. On one side, the Internet brings in tremendous potential to business in terms of reaching the end users. At the same time it also brings in lot of security risk to the business over the network. With the growth of cyber-attacks, information safety has become an important issue all over the world. Intrusion detection systems (IDSs) are an essential element for network security infrastructure and play a very important role in detecting large number of attacks. This survey paper introduces a detailed analysis of the network security problems and also represents a review of the current research. The main aim of the paper is to finds out the problem associated with network security for that various existing approaches related to intrusion detection and preventions are discussed. This survey focuses on presenting the different issues that must be addressed to build fully functional and practically usable intrusion detection systems (IDSs). It points out the state of the art in each area and suggests important open research issues.

[1]  Biswanath Mukherjee,et al.  A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[2]  Shyam Nandan Kumar DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds , 2015 .

[3]  Carlos García Garino,et al.  An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection , 2012, Expert Syst. Appl..

[4]  Victor Valeriu Patriciu,et al.  Intrusions detection based on Support Vector Machine optimized with swarm intelligence , 2014, 2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI).

[5]  A. Qayyum,et al.  Taxonomy of statistical based anomaly detection techniques for intrusion detection , 2005, Proceedings of the IEEE Symposium on Emerging Technologies, 2005..

[6]  Hiroki Takakura,et al.  Toward a more practical unsupervised anomaly detection system , 2013, Inf. Sci..

[7]  C. F. Chong,et al.  IDR: an intrusion detection router for defending against distributed denial-of-service (DDoS) attacks , 2004, 7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings..

[9]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[10]  A.H. Sung,et al.  Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..

[11]  I. Monitor Information Security Management Handbook , 2000 .

[12]  Chia-Ming Chang,et al.  An active network-based intrusion detection and response systems , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.

[13]  Tae-Young Choe,et al.  Distributed Processing of Snort Alert Log using Hadoop , 2013 .

[14]  Gang Zhao,et al.  Analysis about Performance of Multiclass SVM Applying in IDS , 2013 .

[15]  Vern Paxson,et al.  Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.

[16]  Oludele Awodele,et al.  A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS) , 2009 .

[17]  Dipika Narsingyani,et al.  Optimizing false positive in anomaly based intrusion detection using Genetic algorithm , 2015, 2015 IEEE 3rd International Conference on MOOCs, Innovation and Technology in Education (MITE).

[18]  Shyam Nandan Kumar Cryptography during Data Sharing and Accessing Over Cloud , 2015 .

[19]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[20]  Karl N. Levitt,et al.  The Design of GrIDS: A Graph-Based Intrusion Detection System , 2007 .

[21]  Petra Holtzmann Ccna Security Study Guide Exam 640 553 , 2016 .

[22]  Venu Govindaraju,et al.  Data mining for intrusion detection: techniques, applications and systems , 2004, Proceedings. 20th International Conference on Data Engineering.

[23]  David R. Miller,et al.  Security Information and Event Management , 2010 .

[24]  Siyang Zhang,et al.  A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..

[25]  Zhiyuan Ma,et al.  Autonomous mobile agent based intrusion detection framework in wireless body area networks , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[26]  Kumar Das Protocol Anomaly Detection for Network-based Intrusion Detection , 2002 .

[27]  Fatin Norsyafawati Mohd Sabri,et al.  Identifying False Alarm Rates for Intrusion Detection System with Data Mining , 2011 .

[28]  Vikram Chopra,et al.  A Novel Approach for Intrusion Detection , 2011 .

[29]  Cheng-Zen Yang,et al.  Design of an Active Intrusion Monitor System , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..

[30]  Tim Bass,et al.  Intrusion detection systems and multisensor data fusion , 2000, CACM.

[31]  Wei Xu,et al.  Incremental SVM based on reserved set for network intrusion detection , 2011, Expert Syst. Appl..

[32]  Shyam Nandan Kumar,et al.  Review on Network Security and Cryptography , 2015 .

[33]  Shyam Nandan Kumar,et al.  World towards Advance Web Mining: A Review , 2015 .

[34]  Herbert J. Mattord,et al.  Principles of Information Security , 2004 .

[35]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[36]  Sherif Abdelwahed,et al.  HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.

[37]  G. Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[38]  Abdelkarim Erradi,et al.  A hierarchical, autonomous, and forecasting cloud IDS , 2013, 2013 5th International Conference on Modelling, Identification and Control (ICMIC).

[39]  Masahiko Takenaka,et al.  TOPASE: Detection of brute force attacks used disciplined IPs from IDS log , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[40]  Chuanhe Huang,et al.  Selection of Candidate Support Vectors in incremental SVM for network intrusion detection , 2014, Comput. Secur..

[41]  Abdullah Sharaf Alghamdi,et al.  Remote to Local attack detection using supervised neural network , 2010, 2010 International Conference for Internet Technology and Secured Transactions.

[42]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[43]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[44]  Amit Vajpayee,et al.  ASP: Advanced Security Protocol for Security and Privacy in Cloud Computing , 2016 .

[45]  Min Du,et al.  Secure Vault: An Intrusion Prevention Model for Ender-Users , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).

[46]  Khattab M. Ali Alheeti,et al.  Hybrid intrusion detection in connected self-driving vehicles , 2016, 2016 22nd International Conference on Automation and Computing (ICAC).

[47]  J. F. McClary,et al.  NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..

[48]  Guo Fan,et al.  Polymorphic worms signature extraction based-on improved ant colony algorithm , 2014, 2014 9th International Conference on Computer Science & Education.

[49]  Eleazar Eskin,et al.  A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .

[50]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[51]  E. Eugene Schultz Security Information and Event Management (SIEM) , 2011, Encyclopedia of Information Assurance.

[52]  Ilsun You,et al.  Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions , 2012, 2012 15th International Conference on Network-Based Information Systems.

[53]  Hajime Shimada,et al.  Unknown Attack Detection by Multistage One-Class SVM Focusing on Communication Interval , 2014, ICONIP.

[54]  Salvatore J. Stolfo,et al.  Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems , 2002 .

[55]  M. Abliz Internet Denial of Service Attacks and Defense Mechanisms , 2011 .

[56]  Julie A. Dickerson,et al.  Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).

[57]  Alaa Hussein Al-Hamami,et al.  Developing a Host Intrusion Prevention System by Using Data Mining , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[58]  Peter G. Neumann,et al.  EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.

[59]  Monther Aldwairi,et al.  Exhaust: Optimizing Wu-Manber pattern matching for intrusion detection using Bloom filters , 2015, 2015 2nd World Symposium on Web Applications and Networking (WSWAN).

[60]  Mark Handley,et al.  Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.

[61]  Michael Schatz,et al.  Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.

[62]  A. Midzic,et al.  Intrusion detection system modeling based on neural networks and fuzzy logic , 2016, 2016 IEEE 20th Jubilee International Conference on Intelligent Engineering Systems (INES).

[63]  Yasser Yasami,et al.  A novel unsupervised classification approach for network anomaly detection by k-Means clustering and ID3 decision tree learning methods , 2010, The Journal of Supercomputing.

[64]  Eugene H. Spafford,et al.  IDIOT - Users Guide , 1996 .

[65]  Youngseok Lee,et al.  Toward scalable internet traffic measurement and analysis with Hadoop , 2013, CCRV.

[66]  Steven R. Snapp,et al.  The DIDS (Distributed Intrusion Detection System) Prototype , 1992, USENIX Summer.

[67]  Muhammad Hussain,et al.  Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components , 2014, Neural Computing and Applications.

[68]  Octavio Nieto-Taladriz,et al.  Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms , 2007, The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007).

[69]  Maninder Singh,et al.  PythonHoneyMonkey: Detecting malicious web URLs on client side honeypot systems , 2014, Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization.

[70]  Saadiah Yahya,et al.  A hybrid intrusion detection system based on different machine learning algorithms , 2013 .

[71]  Ester Yen,et al.  Data mining-based intrusion detectors , 2009, Expert Syst. Appl..

[72]  Amit Vajpayee,et al.  A Survey on Secure Cloud: Security and Privacy in Cloud Computing , 2016 .

[73]  R. Newman Computer Security: Protecting Digital Resources , 2009 .

[74]  Shyam Nandan Kumar Technique for Security of Multimedia using Neural Network , 2014 .