An Effective Intrusion Detection System
An Effective Intrusion Detection System
Neha Agrawal
neha11195@gmail.com
Prof. Priyanka Vijayvargiya
Computer Science and Engineering
Shri Vaishnav Institute of Technology and Science, Indore
ABSTRACT
It is unrealistic to prevent security breaches completely using the existing security technologies.
The intrusion detection plays an important role in network security. Most of the current intrusion
detection systems (IDSs) are signature based systems. Signature based IDS also known as misuse
detection looks for a specific signature to match, signaling an intrusion. Provided with the
signatures or patterns they can detect many or all known attack patterns but they are of little use
for as yet unknown attacks. Rate of false positives is close to nil but these types of systems are
poor at detecting new attacks or variation of known attacks or attacks that can be masked as
normal behavior.
The other type of IDS i.e. Statistical Based Intrusion detection System (SBIDS) can overcome
many of the aforementioned limitations of signature based intrusion detection systems. The
statistical based intrusion detection systems performs better than signature based intrusion
detection system for novelty detection i.e. detection of new attack is very important for intrusion
detection system. Researchers have implemented various classification algorithms for intrusion
detection.
1.INTRODUCTION
1.1 Background
The field of intrusion detection has received increasing attention in present years. First reason is
the explosive growth of the internet and the large number of networked systems that exist in all
types of organizations. The intrusion detection techniques using data mining have attracted more
and more interests in recent years. As an important application of data mining these techniques
aim to meliorate the great burden of analyzing huge volumes of audit data and realizing
performance optimization of detection rules. The objective of proposed work is to try out the
intrusion detection on large dataset by classification algorithms and improved its learning time
and detection rate in the field of Network based IDS.
These system can be classified based on which events they monitor how they collect information
and how they reduce from the information that an intrusion has occurred. All the IDSs that
scrutinize data circulating on the network are called Network IDSs (NIDSs) while IDSs that
reside on the host and collect logs of operating system- related events are called Host IDSs
(HIDSs). IDSs may also vary according to the technique by which they detect intrusions.
Because they only scrutinize network traffic , the NIDS do not benefit from running on the host.
They are often run on dedicated machines that observe the network flows sometimes in
conjunction with a firewall. In this case they are not affected by security vulnerabilities on the
machines they are monitoring. Only a limited number of information can be inferred from data
gathered on the network link. The widespread adoption of end-to-end encryption further limits
the amount of information that can be gathered at the network interface.
One major shortcoming of NIDS is that they are oblivious to local root attacks. The authorized
user of the system that attempts to gain additional privileges will not be deleted if attack is
performed locally. The authorized user of the system may be able to set up an encrypted channel
when accessing the machine remotely.
The HIDS have an ideal vantage point . An HIDS runs on the machine it monitors, HIDS can
theoretically observe and log any event occurring on the machine. The complexity of current
operating system often makes it difficult if not impossible to accurately monitor certain events.
There are many difficulties faced by security tools that rely on system calls interposition to
monitor a host.
All intrusion detection system use one of the two detection techniques statistical anomaly based
and signature based.
The SIDS or signature based IDS are also known as misuse detection looks for a specific
signature to match or signaling an instruction. They are provided with the signatures or patterns,
but SIDS are of little use for as yet unknown attack methods. It means that an IDS using misuse
detection will only detect known attacks .
One more approach to intrusion detection is called anomaly detection. The anomaly detection
applied to intrusion detection and computer security has been an active area of research since it
was originally proposed by Denning 1987. The anomaly detection algorithm have the advantage
that they can detect new types of intrusion as deviations from normal usage. In this problem, a
set of normal data to train from is given, and a new piece of test data is also given. The objective
of the intrusion detection system is to determine whether the test data belong to normal or to an
anomalous behavior. However this anomaly detection scheme suffers from a high rate of false
alarms. It happens primarily because previously unseen system behavior are also recognized as
anomaly and hence flagged as potential instructions.
The following characteristics are ideally desirable for an intrusion detection system (based on the
list provided by Crosby and Safford[2]).