Filters








43,225 Hits in 6.2 sec

An Efficient Flow-based Multi-level Hybrid Intrusion Detection System for Software-Defined Networks [article]

Majd Latah, Levent Toker
2018 arXiv   pre-print
Flow statistics provided by the controller are considered to be useful information that can be used to develop a network-based intrusion detection system.  ...  Therefore, in this paper, we propose a 5-level hybrid classification system based on flow statistics in order to attain an improvement in the overall accuracy of the system.  ...  Recently, a flow-based deep learning approach [32] has been proposed for the purpose of intrusion detection in SDNs, where the system achieved a good accuracy reaching 75.75% only on the basis of 6-flow  ... 
arXiv:1806.03875v1 fatcat:m4kzfzcbcfe3teimnscnbd7cey

Cyber-physical system security for networked industrial processes

Shuang Huang, Chun-Jie Zhou, Shuang-Hua Yang, Yuan-Qing Qin
2015 International Journal of Automation and Computing  
The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer.  ...  To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language (AADL) environment  ...  Networked water level control system The NWLCS, shown in Fig. 7 , is composed of 3 layers: supervision layer, RT control layer and physical system.  ... 
doi:10.1007/s11633-015-0923-9 fatcat:dzudgletdzhkhehunq6fm32bju

Minimizing false positive rate for DoS attack detection: A hybrid SDN-based approach

Majd Latah, Levent Toker
2019 ICT Express  
In this work, we take the advantage of software-defined networking (SDN) to minimize the false positive rate of DoS attack detection systems.  ...  Recently, a novel networking paradigm that provides enhanced programming abilities has been proposed to attain an efficient control and management in future networks.  ...  Declaration of competing interest The authors declare that there is no conflict of interest in this paper.  ... 
doi:10.1016/j.icte.2019.11.002 fatcat:evy6v5bumrgj7mommghxymsmxy

P4ID: P4 Enhanced Intrusion Detection

Benjamin Lewis, Matthew Broadbent, Nicholas Race
2019 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)  
The growth in scale and capacity of networks in recent years leads to challenges of positioning and scalability of Intrusion Detection Systems (IDS).  ...  With the flexibility afforded by programmable dataplanes, it is now possible to perform a new level of intrusion detection in switches themselves.  ...  an intrusion detection system.  ... 
doi:10.1109/nfv-sdn47374.2019.9040044 dblp:conf/nfvsdn/LewisBR19 fatcat:xxxjfp5auvdf5ixfhijxokqmhm

Abstracting Packet Header Information for Intrusion Detection in High-Speed Networks

Lawrence B Adewole, Catherine R Adeyeye, Adebayo O Adetunmbi, Bosede A Ayogu, Olaiya Folorunsho
2020 FUOYE Journal of Engineering and Technology  
of network flow for detecting intrusion.  ...  Flow-based intrusion detection system has been proposed as an alternative to a packet-based intrusion detection system as it relies on information embedded in packet header and various statistical analyses  ...  Kim et al. (2004) proposed a flow-based intrusion detection system for a robust and efficient intrusion detection system in high-speed network.  ... 
doi:10.46792/fuoyejet.v5i2.541 fatcat:xgternwx3zagreaismp45zims4

A Two-Level Flow-Based Anomalous Activity Detection System for IoT Networks

Imtiaz Ullah, Qusay H. Mahmoud
2020 Electronics  
In this paper, we propose a two-level anomalous activity detection model for intrusion detection system in IoT networks.  ...  A two-level anomalous activity detection system for IoT networks we proposed will provide a robust framework for the development of malicious activity detection system for IoT networks.  ...  Figure 1 shows the types of flow-based intrusion detection systems. In this paper, we propose a two-level anomalous activity detection system for IoT networks.  ... 
doi:10.3390/electronics9030530 fatcat:qe6krxv3kzgivghdfprupmrlsy

DFIPS: Toward Distributed Flexible Intrusion Prevention System in Software Defined Network

Xuesong Jia, Danni Ren, Yitao Yang, Huakang Li, Guozi Sun
2016 Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering  
In this paper, we propose a distributed flexible intrusion prevention system in software defined network (DFIPS).  ...  Intrusion prevention system (IPS) has widely deployed as a crucial measure in traditional network architecture to protect network from malignity.  ...  CONCLUSIONS AND FUTURE WORK In this paper, we present a distributed flexible intrusion prevention system in software defined network.  ... 
doi:10.18293/seke2016-139 dblp:conf/seke/JiaRYLS16 fatcat:gzngq3bnwvf3hhiuu64k2kjjpy

High-performance Architecture of Network Intrusion Prevention Systems

Zhao Yueai, Hou Pengcheng, Wang Ling, Han Suqing
2014 EAI Endorsed Transactions on Scalable Information Systems  
Software-based Network Intrusion Prevention Systems have difficulty in handling high speed links.  ...  A set of network-based anomaly Intrusion Detection sensors is used in processing network traffic.  ...  The data layer is composed of the network processors, as a coprocessor to achieve precise and high-performance handing in network level.  ... 
doi:10.4108/sis.1.3.e3 fatcat:wdxpm6z44ndgzb3vmslunq25b4

SPANIDS

Lambert Schaelicke, Kyle Wheeler, Curt Freeland
2005 Proceedings of the 2nd conference on Computing frontiers - CF '05  
Network intrusion detection systems (NIDS) are becoming an increasingly important security measure.  ...  With rapidly increasing network speeds, the capacity of the NIDS sensor can limit the ability of the system to detect intrusions.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/1062261.1062314 dblp:conf/cf/SchaelickeWF05 fatcat:xner754wsjcynncabyrov2rfdq

CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture [chapter]

Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia
2006 Lecture Notes in Computer Science  
The largely computerised nature of critical infrastructures and the pervasive interconnection of systems all over the world have generated the problem of achieving resilience of critical information infrastructures  ...  for modern critical information infrastructures in general.  ...  Functionally, the information flow is controlled by basic mechanisms of the firewall and intrusion detection type, complemented and parameterised by organisation-level security policies and access control  ... 
doi:10.1007/11962977_1 fatcat:icn65da2qjhhbpujn5ekj4irti

Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN

Jahanzaib Malik, Adnan Akhunzada, Iram Bibi, Muhammad Imran, Arslan Musaddiq, Sung Won Kim
2020 IEEE Access  
Software defined network (SDN) centralized control intelligence and network abstraction aims to facilitate applications, service deployment, programmability, innovation and ease in configuration management  ...  Our analysis shows that the proposed approach outperforms in terms of detection accuracy with a trivial trade-off speed efficiency.  ...  The proposed framework achieved 85% detection accuracy using Barnyard with Snort a network-based intrusion detection system.  ... 
doi:10.1109/access.2020.3009849 fatcat:5p767sq2zvdojomdgg77wjs7cm

An Efficient Multi Level Intrusion Detection System for Mobile Ad-Hoc Network Using Clustering Technique

2019 International Journal of Engineering and Advanced Technology  
The malicious node can also be eliminated from the network. Various modern IDS tools are analyzed with large set of attacks in multiple levels in order to maintain high reliability.  ...  The proposed IDS provides high accuracy when compared to existing algorithms in all levels  ...  Non compliant malicious action and file system modification are detected by this system. Suricata is a network IDS which is used to detect the threat occur in the network level.  ... 
doi:10.35940/ijeat.f8291.088619 fatcat:3qbl6pdz7fgvnp3sfp3entf6we

Parallel Programmable Ethernet Controllers: Performance and Security

Derek Schuff, Vijay Pai, Paul Willmann, Scott Rixner
2007 IEEE Network  
The design is then extended to support a self-securing Gigabit Ethernet controller that performs intrusion detection on all network data frames.  ...  The firmware on the network interface is designed to utilize these resources efficiently by exploiting frame-level, flow-level, and task-level concurrency.  ...  Acknowledgments This work is supported in part by the National Science Foundation (NSF) under Grant Nos. CCR-0209174, CCF-0532448, and CNS-0532452 and by donations from Advanced Micro Devices (AMD).  ... 
doi:10.1109/mnet.2007.386466 fatcat:6ztile7wh5hgneu3bypr7d3qxi

Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface

Derek L. Schuff, Vijay S. Pai
2007 2007 IEEE International Parallel and Distributed Processing Symposium  
Detailed results obtained by simulating various software and hardware configurations show that the proposed system can achieve intrusion detection throughputs in excess of 1 Gigabit per second for fairly  ...  This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC), considering the impact  ...  Background Intrusion Detection Snort is the most popular intrusion-detection system available.  ... 
doi:10.1109/ipdps.2007.370290 dblp:conf/ipps/SchuffP07 fatcat:iz3art5mtzcr7kvpxxmmnjsymm

Deep Reinforcement Learning based Ensemble Model for Intrusion Detection System

Abhijit Das, Pramod -
2022 International Journal of Advanced Computer Science and Applications  
This work suggested the potential value of reinforcement learning in building intrusion detection systems at the packet-level.  ...  In this way, it can integrate flow statistics with packet information and convert intrusion detection tasks to image-associated tasks.  ...  Furthermore, GAN can use to simulate a dynamic network environment for interaction. Secondly, a more robust and highaccuracy anomaly detection system can be devised.  ... 
doi:10.14569/ijacsa.2022.01304100 fatcat:fwkviaxa65egja3tqzvemi7nv4
« Previous Showing results 1 — 15 out of 43,225 results