SlideShare une entreprise Scribd logo
1  sur  10
2013 IEEE 10th International Conference
on e-Business Engineering
Network intrusion detection systems in high-speed traffic in
computer networks
Waleed Bul’ajoul Anne James
Mandeep Pannu
Faculty of Engineering and Faculty of
Engineering and Faculty of Engineering and
Computing Computing
Computing
Coventry University Coventry
University Coventry University
Coventry, UK Coventry, UK
Coventry, UK
Bulajouw@coventry.ac.uk
Csx118@coventry.ac.uk Aa3371@coventry.ac.uk
Abstract—With the various and increasingly malicious
inadvisable to depend only on prevention techniques,
attacks on networks and wireless systems, traditional
especially when an attacker has successfully obtained
security tools such as anti-virus programs and firewalls are
vulnerable information from a network, but prevention can
not sufficient to provide free, integrated, reliable and secure
successfully and effectively restore a network before an
networks. Intrusion detection systems (IDSs) are one of the
attack is launched.
most tested and reliable technologies to monitor incoming
Correction techniques are adopted to protect computer
and outgoing network traffic to identify unauthorized usage
systems. Along with prevention, they actively work to
and mishandling of computer system networks.
block intrusions, but can continue to battle a successful
It is critical to implement network intrusion detection
intrusion. Nevertheless, a number of successful attacks can
systems (NIDSs) in computer networks that have high traffic
be controlled using prevention techniques if an attack is
and high-speed connectivity. Due to the fact that software
detected at the interim stage of prevention systems. This is
NIDSs are still unable to detect all the growing threats to
difficult, because some successful attacks can get through
high-speed environments, such as flood attacks (UDP, TCP,
the prevention system [1]. It is a matter of a system being
ICMP and HTTP) or Denial and Distributed Denial of
attacked, compromised, and consequently malfunctioning.
Service Attacks (DoS/DDoS), because the main function of
Here we need an interim stage such as the detection phase,
these kinds of attacks is simply to send more traffic in high
which should be positive during intrusions. Therefore, the
speed to systems to stop or slow down the performance of
detection method is preferred to minimize network costs
systems.
and fill in the gap between correction and prevention
mechanisms.
Here we have designed a suitable real network to present
Intrusion Detection (ID) is one of the most tested and
experiments that use Snort NIDSs to demonstrate the
reliable technologies to monitor incoming and outgoing
weaknesses of NIDSs, such as its inability to process multiple
network traffic to identify unauthorized usage and
packets at high speeds and its propensity to drop packets
mishandling of computer system networks [3, 4]. In
without analysing them. This paper outlines Snort NIDSs’
addition, ID identifies the activity of malicious attackers.
failures in high-speed and heavy traffic and its propensity to
Due to the fact that numerous computer systems are
drop more packets as the speed and volume of traffic
unable to prevent threats such as flood attacks, DoS
increase. We ran some consecutive tests to analyse the Snort
performance using the number of packets received, the
attacks and DDoS attacks affect many systems, because
number of packets analysed, the number of packets filtered
the impact of such attacks is severe and irrevocable. The
and the number of packets dropped. We suggest a parallel
main function of these kinds of attacks is to send more
NIDS technology to reduce dropping packets as a solution.
high-speed traffic to a network address, which stops or
slows down the performance of legitimate users’ computer
Keywords-network security; open source; IDS.
network systems by exploiting vulnerabilities such as mis-
configurations and software bugs generated from internal
I. INTRODUCTION
and external networks.
Security is a major concern in every aspect of our daily
It is critical to implement ID systems (IDSs) in
life. New methods and equipment have been devised to
computer networks that have high traffic and high-speed
ensure privacy. However, computer networks still face
connectivity [5]. IDSs consist of either software
many threats [1]. There are usually three stages to
applications or hardware to listen for and detect malicious
achieving security in computer system networks:
activities at the gateways (incoming and outgoing) of
prevention, detection and correction [2]. Prevention is
individual or network systems. Therefore, an IDS’s
preferable to detection and correction, but it is impossible
sniffing mechanism is effectively applied at the network
to prevent 100 per cent of attacks [1, 3]. Moreover,
gateway, which provides useful information about packets
detection techniques provide more accurate results in
and traffic to security professionals.
detecting malicious attackers than correction techniques.
Hardware-based NIDSs are effective and useful for
Despite the existence of a variety of security protection
large organizations and companies, but their high cost is
measures, an attacker often attempts to make services
an issue. However, one of the most popular NIDS software
merely unavailable to intended legitimate users [3]. It is
is Snort.
978-0-7695-5111-1/13 $26.00 © 2013 IEEE 168
DOI 10.1109/ICEBE.2013.26
In this paper, we present an experiment to test Snort
circumstances in the network, which results in an
NIDS under high-volume and heavy traffic, demonstrating
inaccurate detection mechanism. IDSs are still unable to
that it drops more packets as the speed and volume of
control all threats and malicious activities [1, 9]. To
traffic increase. We will also prove that the performance
overcome such design and implementation difficulties,
and capability of NIDS can be increased and the
novel IDS outcomes have been obtained from multiple
processing time of network traffic can decreased and
characteristics of advanced computer networks:
effectively handled by an alternative technique known as
Processing in real time;
parallel NIDS.
High speeds and high loads;
Reducing difficulties for defenders; and
II. BACKGROUND
Increasing difficulties for attackers.
The specialized IDS mechanism is based on how,
A. Security Products
where and what it detects, along with mandatory
Security products such as firewalls and antivirus
requirements. In particular, IDSs should be based on
programs are less efficient than IDSs and have different
flexible and scalable network components to accommodate
functionalities. IDSs analyse collected information and
the drastic increase in today’s network environments. They
infer more useful results than other security products. The
should provide straightforward management and
difference between IDSs and security products such as
operational procedures and steps rather than complicating
antivirus programs is that, while IDSs require more
underlying tasks, and they should provide user-friendly ID
intelligence than security product software, they analyse
mechanisms.
gathered information and deduce useful results [1].
1) Firewall technology
III. INTRUSION DETECTION SYSTEM
Network traffic is usually filtered according to criteria
such as origin, destination, protocol and service, typically
An intrusion detection system (IDS) is used to make
through dedicated routers called firewalls [1].
security professionals aware of packets entering and
The functionality of the firewall is based on filtering
leaving a monitored network. IDSs are often used to sniff
mechanisms specified by a set of rules, known as a policy,
out network packets, thereby providing a good
which can protect a system from flooding attacks [1]. The
understanding of what is really happening on the network.
basic operation of firewalls is to filter packets passing
An IDS is based on either hardware or software, where
through specific hosts or network ports, which are usually
incoming and outgoing individuals and/or network traffic
open in most computer systems [1]. It does not perform
have been listened to, and has the potential to detect and
deep analysis (malicious code detection in the packet) and
report any evidence of attacks [4, 10].
treats each packet as an individual entity [1].
The typical actions of IDS software can be classified as
The disadvantage of a firewall is that it cannot fully
follows:
protect an internal network; it is unable to stop internal
Monitoring entire and/or partial packets;
attacks [1, 6]. For example, malicious and unwanted web
Detecting suspicious activities;
traffic can go through a firewall to strike and damage a
Recording required events; and
protected computer system without a hitch.
Sending updates to the network administrator.
2) Anti-virus technology
IDS are classified into three main types: network-
Computer viruses are programs which cause computer
based, host-based and hybrid.
failure and damage computer data. Especially in a network
environment, a computer virus poses an immeasurable
A. Network-based IDSs
threat and can be very destructive [6]. The functionality of
Network-based IDSs (NIDSs) have become a critical
an anti-virus program is a running process that examines
component of an organization’s security solution [24]. An
executables, worms and viruses in the memory of guarded
NIDS is capable of detecting a broad range of malicious
computer/network systems instead of monitoring network
and unwanted attacks occurring in an application, network
traffic.
and transport layers, along with unexpected services based
Although an anti-virus program monitors the integrity
on multiple applications. In addition, NIDSs are able to
of data files against illegal modifications, it is unable to
detect and monitor network traffic and secure computer
block unwanted network traffic intended to damage the
systems from network-based threats without network
network. [7].
policy violations [11].
3) IDS technology
Disadvantaged NIDS are usually unable to execute
Firewalls have been used for network security for a
entire network packets, which results in incomplete
long time, but they can be easily bypassed, as a lot of
analyses and therefore considerable delays in high-speed
techniques for deceiving firewalls have been developed
and high-load environments [11].
[8]. IDSs are much more advanced and enhanced security
tools than firewalls, because a firewall just drops
B. Host-based IDSs
packets—it cannot detect intrusion [1].
Host-based IDSs (HIDSs) are implemented to monitor
In addition, it is difficult to detect suspicious activities
suspected events happening in local host machines. HIDS
in the midst of high traffic and other such adverse
are versatile due to their installation over servers,
169
workstations and notebooks, as compared to NIDS. In
C. Protocol Anomaly detection (Models are built on
addition, HIDSs are capable of monitoring malicious
TCP/IP protocols using their specifications).
networks and multiple events happening within the
Intruders usually use signatures which behave similarly
protected host. An HIDS is situated at the end point of a
to viruses used in computers. Protocol anomaly detection
computer network that has anti-threat applications such as
analyses data packets related to IPs, which contain known
spyware detection, firewalls and antivirus software
anomalies and single or sets of signatures. The detection
programs, which provide access to outside environments
system is capable of detecting suspicious activity in the
such as the Internet [11].
logs and generates alterations based on these signatures
The disadvantages of an HIDS are as follows:
and rules. On the other hand, anomaly-based IDSs
It consumes computer system resources that
generally depend on detecting packet anomalies available
should be allocated for services.
in the header parts of the protocol.
It may conflict with existing security policies of
firewalls and operating systems.
V. SIGNATURE-BASED DETECTION
It cannot easily analyse intrusion attempts on
A signature is generally based on an observable pattern
multiple computers.
inside the data packet. This technique helps to detect
It can be very difficult to maintain in large
several kinds of attacks and the presence of intrusive
networks with different operating systems and
activity, such as the presence of “scripts/iisad-min” in a
configurations.
packet used for web services. However, it is difficult to
It can be disabled by attackers after the system is
sort out the signatures in the headers of IP, UPD, TCP,
compromised.
Application Layer and Payload [12].
It requires many hosts to reboot after a complete
Signature-based IDSs are efficient at detecting pre-
installation or an update [5]. Many essential
defined attacks, but they increase the size of databases
servers cannot support this operation.
because each available signature must be entered or made
available in the database. Therefore, each arriving packet
C. Hybrid-based IDS
can be compared with the signatures available in the
In some situations, HIDSs and NIDSs may unable to
database, but this reduces the efficiency of the system in
fulfil the requirements for intrusion detection because any
terms of time and throughput and increases network
one type of IDS has both inherent virtues and
delays.
shortcomings. Therefore, a combination of an HIDS and
It is now common to test NIDSs in high-speed
an NIDS is known as a Hybrid IDS [5].
infrastructures with large amounts of data, but they are
unable to rectify malicious activities and threats. NIDS are
IV. NETWORK INTRUSION DETECTION SYSTEM
effective and useful in controlling malicious activity and
METHODOLOGY
threats under circumstances where traffic is constantly
NIDS can be classified into three (3) fundamental
growing [7, 13]. NIDSs are further classified into
categories:
software- or hardware-based. It is also observed that
software-based NIDSs still require enhancement for a
A. Anomaly-based IDSs
network with a high volume of high-speed data, but they
Anomaly-based IDSs require a background of
are useful for small networks [13, 14]. However, one of
foundation-based information and need particular
the most strong and popular open-source NIDS is Snort.
knowledge of the system being protected. Such systems
The Snort NIDS was introduced as a light-weight-
have profound merit in gathering evidence in the form of
based IDS [13, 14], but due to the drastic growth of
statistics, data, facts, and figures, which are responsible for
technology, it has been significantly improved as well
the formation of baselines during the learning period.
[15]. It consists of a combination of language rule driving
The baseline profile is the normal learned behaviour of
and signatures, where protocol anomaly- and signature-
the monitored system and is developed during the learning
based inspection methods are used [15]. In spite of the
period, while the IDS learns the environment and develops
huge development over the years, Snort is still struggling
a normal profile of the monitored system. This
to sustain its growth in the network industry and attacks.
environment can be a network, users, a system, etc. [9].
Many studies indicate that it is unable to cope with recent
Anomaly-based IDSs are further classified into the
attacks [15, 16], because multiple threats and attacks such
following anomalies:
ICMP, HTTP, UDP (flood attacks) and DDoS attacks have
Protocol-based Anomaly
adopted high traffic and speed to attack a system.
Application Payload-based Anomaly
VI. SNORT OVERVIEW
B. Signature-based IDSs
Snort is accessible free of cost and is ranked among the
top systems available nowadays with the best features. It is
released as an open-source NIDS based on a rule-based
IDS, which stores information in text files; such text files
can be modified by a text editor. Rules are grouped into
170
06686259 20140405 205404

Contenu connexe

Tendances

NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
Nishanth Gandhidoss
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Deepak Mishra
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...
IJECEIAES
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System

Tendances (20)

Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
 
Denial of Service Attack Defense Techniques
Denial of Service Attack Defense TechniquesDenial of Service Attack Defense Techniques
Denial of Service Attack Defense Techniques
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
 
N44096972
N44096972N44096972
N44096972
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetAugment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 

Similaire à 06686259 20140405 205404

INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
IJMIT JOURNAL
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
Alison Hall
 

Similaire à 06686259 20140405 205404 (20)

Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
 
A STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONA STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTION
 
A STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONA STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTION
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systems
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHMAN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
1776 1779
1776 17791776 1779
1776 1779
 
1776 1779
1776 17791776 1779
1776 1779
 
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
 
Ijnsa050208
Ijnsa050208Ijnsa050208
Ijnsa050208
 

Dernier

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Dernier (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 

06686259 20140405 205404

  • 1. 2013 IEEE 10th International Conference on e-Business Engineering Network intrusion detection systems in high-speed traffic in computer networks Waleed Bul’ajoul Anne James Mandeep Pannu Faculty of Engineering and Faculty of Engineering and Faculty of Engineering and Computing Computing Computing Coventry University Coventry University Coventry University Coventry, UK Coventry, UK Coventry, UK Bulajouw@coventry.ac.uk Csx118@coventry.ac.uk Aa3371@coventry.ac.uk Abstract—With the various and increasingly malicious inadvisable to depend only on prevention techniques, attacks on networks and wireless systems, traditional especially when an attacker has successfully obtained security tools such as anti-virus programs and firewalls are vulnerable information from a network, but prevention can not sufficient to provide free, integrated, reliable and secure successfully and effectively restore a network before an networks. Intrusion detection systems (IDSs) are one of the attack is launched. most tested and reliable technologies to monitor incoming Correction techniques are adopted to protect computer and outgoing network traffic to identify unauthorized usage systems. Along with prevention, they actively work to and mishandling of computer system networks. block intrusions, but can continue to battle a successful It is critical to implement network intrusion detection intrusion. Nevertheless, a number of successful attacks can systems (NIDSs) in computer networks that have high traffic be controlled using prevention techniques if an attack is and high-speed connectivity. Due to the fact that software detected at the interim stage of prevention systems. This is NIDSs are still unable to detect all the growing threats to difficult, because some successful attacks can get through high-speed environments, such as flood attacks (UDP, TCP, the prevention system [1]. It is a matter of a system being ICMP and HTTP) or Denial and Distributed Denial of attacked, compromised, and consequently malfunctioning. Service Attacks (DoS/DDoS), because the main function of Here we need an interim stage such as the detection phase, these kinds of attacks is simply to send more traffic in high which should be positive during intrusions. Therefore, the
  • 2. speed to systems to stop or slow down the performance of detection method is preferred to minimize network costs systems. and fill in the gap between correction and prevention mechanisms. Here we have designed a suitable real network to present Intrusion Detection (ID) is one of the most tested and experiments that use Snort NIDSs to demonstrate the reliable technologies to monitor incoming and outgoing weaknesses of NIDSs, such as its inability to process multiple network traffic to identify unauthorized usage and packets at high speeds and its propensity to drop packets mishandling of computer system networks [3, 4]. In without analysing them. This paper outlines Snort NIDSs’ addition, ID identifies the activity of malicious attackers. failures in high-speed and heavy traffic and its propensity to Due to the fact that numerous computer systems are drop more packets as the speed and volume of traffic unable to prevent threats such as flood attacks, DoS increase. We ran some consecutive tests to analyse the Snort performance using the number of packets received, the attacks and DDoS attacks affect many systems, because number of packets analysed, the number of packets filtered the impact of such attacks is severe and irrevocable. The and the number of packets dropped. We suggest a parallel main function of these kinds of attacks is to send more NIDS technology to reduce dropping packets as a solution. high-speed traffic to a network address, which stops or slows down the performance of legitimate users’ computer Keywords-network security; open source; IDS. network systems by exploiting vulnerabilities such as mis- configurations and software bugs generated from internal I. INTRODUCTION and external networks. Security is a major concern in every aspect of our daily It is critical to implement ID systems (IDSs) in life. New methods and equipment have been devised to computer networks that have high traffic and high-speed ensure privacy. However, computer networks still face connectivity [5]. IDSs consist of either software many threats [1]. There are usually three stages to applications or hardware to listen for and detect malicious achieving security in computer system networks: activities at the gateways (incoming and outgoing) of prevention, detection and correction [2]. Prevention is individual or network systems. Therefore, an IDS’s preferable to detection and correction, but it is impossible sniffing mechanism is effectively applied at the network
  • 3. to prevent 100 per cent of attacks [1, 3]. Moreover, gateway, which provides useful information about packets detection techniques provide more accurate results in and traffic to security professionals. detecting malicious attackers than correction techniques. Hardware-based NIDSs are effective and useful for Despite the existence of a variety of security protection large organizations and companies, but their high cost is measures, an attacker often attempts to make services an issue. However, one of the most popular NIDS software merely unavailable to intended legitimate users [3]. It is is Snort. 978-0-7695-5111-1/13 $26.00 © 2013 IEEE 168 DOI 10.1109/ICEBE.2013.26
  • 4. In this paper, we present an experiment to test Snort circumstances in the network, which results in an NIDS under high-volume and heavy traffic, demonstrating inaccurate detection mechanism. IDSs are still unable to that it drops more packets as the speed and volume of control all threats and malicious activities [1, 9]. To traffic increase. We will also prove that the performance overcome such design and implementation difficulties, and capability of NIDS can be increased and the novel IDS outcomes have been obtained from multiple processing time of network traffic can decreased and characteristics of advanced computer networks: effectively handled by an alternative technique known as Processing in real time; parallel NIDS. High speeds and high loads; Reducing difficulties for defenders; and II. BACKGROUND Increasing difficulties for attackers. The specialized IDS mechanism is based on how, A. Security Products where and what it detects, along with mandatory Security products such as firewalls and antivirus requirements. In particular, IDSs should be based on programs are less efficient than IDSs and have different flexible and scalable network components to accommodate functionalities. IDSs analyse collected information and the drastic increase in today’s network environments. They infer more useful results than other security products. The should provide straightforward management and difference between IDSs and security products such as operational procedures and steps rather than complicating antivirus programs is that, while IDSs require more underlying tasks, and they should provide user-friendly ID intelligence than security product software, they analyse mechanisms. gathered information and deduce useful results [1]. 1) Firewall technology III. INTRUSION DETECTION SYSTEM Network traffic is usually filtered according to criteria such as origin, destination, protocol and service, typically An intrusion detection system (IDS) is used to make
  • 5. through dedicated routers called firewalls [1]. security professionals aware of packets entering and The functionality of the firewall is based on filtering leaving a monitored network. IDSs are often used to sniff mechanisms specified by a set of rules, known as a policy, out network packets, thereby providing a good which can protect a system from flooding attacks [1]. The understanding of what is really happening on the network. basic operation of firewalls is to filter packets passing An IDS is based on either hardware or software, where through specific hosts or network ports, which are usually incoming and outgoing individuals and/or network traffic open in most computer systems [1]. It does not perform have been listened to, and has the potential to detect and deep analysis (malicious code detection in the packet) and report any evidence of attacks [4, 10]. treats each packet as an individual entity [1]. The typical actions of IDS software can be classified as The disadvantage of a firewall is that it cannot fully follows: protect an internal network; it is unable to stop internal Monitoring entire and/or partial packets; attacks [1, 6]. For example, malicious and unwanted web Detecting suspicious activities; traffic can go through a firewall to strike and damage a Recording required events; and protected computer system without a hitch. Sending updates to the network administrator. 2) Anti-virus technology IDS are classified into three main types: network- Computer viruses are programs which cause computer based, host-based and hybrid. failure and damage computer data. Especially in a network environment, a computer virus poses an immeasurable A. Network-based IDSs threat and can be very destructive [6]. The functionality of Network-based IDSs (NIDSs) have become a critical an anti-virus program is a running process that examines component of an organization’s security solution [24]. An executables, worms and viruses in the memory of guarded NIDS is capable of detecting a broad range of malicious computer/network systems instead of monitoring network and unwanted attacks occurring in an application, network traffic. and transport layers, along with unexpected services based Although an anti-virus program monitors the integrity on multiple applications. In addition, NIDSs are able to of data files against illegal modifications, it is unable to detect and monitor network traffic and secure computer block unwanted network traffic intended to damage the systems from network-based threats without network network. [7]. policy violations [11].
  • 6. 3) IDS technology Disadvantaged NIDS are usually unable to execute Firewalls have been used for network security for a entire network packets, which results in incomplete long time, but they can be easily bypassed, as a lot of analyses and therefore considerable delays in high-speed techniques for deceiving firewalls have been developed and high-load environments [11]. [8]. IDSs are much more advanced and enhanced security tools than firewalls, because a firewall just drops B. Host-based IDSs packets—it cannot detect intrusion [1]. Host-based IDSs (HIDSs) are implemented to monitor In addition, it is difficult to detect suspicious activities suspected events happening in local host machines. HIDS in the midst of high traffic and other such adverse are versatile due to their installation over servers, 169
  • 7. workstations and notebooks, as compared to NIDS. In C. Protocol Anomaly detection (Models are built on addition, HIDSs are capable of monitoring malicious TCP/IP protocols using their specifications). networks and multiple events happening within the Intruders usually use signatures which behave similarly protected host. An HIDS is situated at the end point of a to viruses used in computers. Protocol anomaly detection computer network that has anti-threat applications such as analyses data packets related to IPs, which contain known spyware detection, firewalls and antivirus software anomalies and single or sets of signatures. The detection programs, which provide access to outside environments system is capable of detecting suspicious activity in the such as the Internet [11]. logs and generates alterations based on these signatures The disadvantages of an HIDS are as follows: and rules. On the other hand, anomaly-based IDSs It consumes computer system resources that generally depend on detecting packet anomalies available should be allocated for services. in the header parts of the protocol. It may conflict with existing security policies of firewalls and operating systems. V. SIGNATURE-BASED DETECTION It cannot easily analyse intrusion attempts on A signature is generally based on an observable pattern multiple computers. inside the data packet. This technique helps to detect It can be very difficult to maintain in large several kinds of attacks and the presence of intrusive networks with different operating systems and activity, such as the presence of “scripts/iisad-min” in a configurations. packet used for web services. However, it is difficult to It can be disabled by attackers after the system is sort out the signatures in the headers of IP, UPD, TCP, compromised. Application Layer and Payload [12]. It requires many hosts to reboot after a complete Signature-based IDSs are efficient at detecting pre- installation or an update [5]. Many essential defined attacks, but they increase the size of databases servers cannot support this operation. because each available signature must be entered or made available in the database. Therefore, each arriving packet C. Hybrid-based IDS can be compared with the signatures available in the In some situations, HIDSs and NIDSs may unable to database, but this reduces the efficiency of the system in fulfil the requirements for intrusion detection because any terms of time and throughput and increases network
  • 8. one type of IDS has both inherent virtues and delays. shortcomings. Therefore, a combination of an HIDS and It is now common to test NIDSs in high-speed an NIDS is known as a Hybrid IDS [5]. infrastructures with large amounts of data, but they are unable to rectify malicious activities and threats. NIDS are IV. NETWORK INTRUSION DETECTION SYSTEM effective and useful in controlling malicious activity and METHODOLOGY threats under circumstances where traffic is constantly NIDS can be classified into three (3) fundamental growing [7, 13]. NIDSs are further classified into categories: software- or hardware-based. It is also observed that software-based NIDSs still require enhancement for a A. Anomaly-based IDSs network with a high volume of high-speed data, but they Anomaly-based IDSs require a background of are useful for small networks [13, 14]. However, one of foundation-based information and need particular the most strong and popular open-source NIDS is Snort. knowledge of the system being protected. Such systems The Snort NIDS was introduced as a light-weight- have profound merit in gathering evidence in the form of based IDS [13, 14], but due to the drastic growth of statistics, data, facts, and figures, which are responsible for technology, it has been significantly improved as well the formation of baselines during the learning period. [15]. It consists of a combination of language rule driving The baseline profile is the normal learned behaviour of and signatures, where protocol anomaly- and signature- the monitored system and is developed during the learning based inspection methods are used [15]. In spite of the period, while the IDS learns the environment and develops huge development over the years, Snort is still struggling a normal profile of the monitored system. This to sustain its growth in the network industry and attacks. environment can be a network, users, a system, etc. [9]. Many studies indicate that it is unable to cope with recent Anomaly-based IDSs are further classified into the attacks [15, 16], because multiple threats and attacks such following anomalies: ICMP, HTTP, UDP (flood attacks) and DDoS attacks have Protocol-based Anomaly adopted high traffic and speed to attack a system. Application Payload-based Anomaly VI. SNORT OVERVIEW B. Signature-based IDSs Snort is accessible free of cost and is ranked among the top systems available nowadays with the best features. It is
  • 9. released as an open-source NIDS based on a rule-based IDS, which stores information in text files; such text files can be modified by a text editor. Rules are grouped into 170