SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 471
A COMBINED APPROACH TO SEARCH FOR EVASION TECHNIQUES
IN NETWORK INTRUSION DETECTION SYSTEM
Rutuja R. Patil1
, P. R. Devale2
1
Research Scholar, Department of Information Technology, Bharati Vidyapeeth Deemed, University College of
Engineering, Pune, Maharashtra, India
2
Professor, Department of Information, Technology, Bharati Vidyapeeth Deemed, Pune, Maharashtra, India
Abstract
Network Intrusion Detection Systems (NIDS) whose base is signature, works on the signature of attacks. They must be updated
quickly in order to prevent the system from new attacks. The attacker finds out new evasion techniques so that he should remain
undetected. As the new evasion techniques are being developed it becomes difficult for NIDS to give accurate results and NIDS
may fail. The key aspect of our paper is to develop a network intrusion detection system using C4.5 algorithm where Adaboost
algorithm is used to classify the packet as normal packet or attack packet and also to further classify different types of attack.
Apriori algorithm is used to find real time evasion and to generate rules to find intrusion These rules are further given as input to
Snort intrusion detection system for detecting different attacks.
Keywords: NIDS, Evasion, Apriori Algorithm, Adaboost Algorithm, Snort
---------------------------------------------------------------------***----------------------------------------------------------------
1. INTRODUCTION
Many established businesses have to maintain a huge
important information and data. Security measures should
protect this information from unauthorized access. The
functioning of burglar alarm in the real world can be
mapped to the working of IDS function in the digital world.
The conflict between the attackers and IDS developers is
never ending because the attackers keep on finding new
ways to get access to the system, while system developers
keep on finding new ways to restrict the attackers.
Intrusion is a technique where in an attacker tries to get
unauthorised access into the system with wrong intention.
Intrusion Detection systems (IDS) is a network security
appliance that monitors network traffic as well as system
activities to check for malicious activity. Intrusion Detection
System can be categorized in two ways Network based
(NIDS) and host based (HIDS) intrusion detection systems.
1.1 Network Based Intrusion Detection System
As the packets on the network are monitored in this system
so it is called as Network Based IDS. Its motive is to check
whether an attacker is trying to get access to the system. The
analysis of the network traffic is done in order to check for
various malicious actions.
These systems can be broadly classified into two major
categories. These are mainly: i) Anomaly based NIDS
(ii)Signature based NIDS. In this paper, we focus on
Signature based NIDS.
1.2 Signature Based Intrusion Detection System
The signatures of the attacks are stored in the database A
signature based IDS compares these signatures with the
packets on the network. Many of the antivirus software
detects malware in the similar fashion. However if a new
threat is discovered it will require some time span to
discover the signature of the threat [2]. This situation causes
attackers to find new evasions over the signatures of these
systems. The overall concept of intruder is to carry out
attack in a way that the Intrusion Detection System should
not be able to detect it as an attack.
Following is the simplified explanation of Evasion:
Let us consider 2 strings ā€œ malicious ā€œ and ā€œanamalous
ā€œwhich represented as known malicious code. The entry to
the system is prohibited when an IDS finds these strings in
the request. However if ā€œ annamil ā€œ and ā€œlousmousciā€ were
part of a request, the system would not recognise it as
malicious strings ā€œmalicious ā€œ and ā€œanamalous ā€œ which are
merged together and reconstructed in a new form and the
attacker can get access to the system.
The IDS does not interfere and entry would be allowed. The
effort of this project is to develop a framework that looks to
find novel evasive techniques by analyzing NIDS behavior.
2. RELATED WORK
Methodology of Network Intrusion Detection Evasion
system is described in several papers. In paper [2] the
authors proposed the concept of evasion and concludes that
the evasion will be successful if the implementation of
NIDS differs from the endpoint implementation.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 472
Fragroute is an evasion tool which intercepts, modifies, and
rewrites the traffic which is routed for the specified
host[Online]. It helps the attackers to bypass the signature
matching on the NIDS.
In paper[5], prototype system IDSprobe is introduced which
tests the accuracy of NIDS to detect and handle evasion
attacks. Author of paper [7] introduces Split Detect
approach where in he focuses on splitting the signature into
pieces.By splitting the signature the attacker is forced to
include at least one piece of information completely and
then the abnormal behavior of packets can be identified.
In the article[10] Snort an open source ,cross platform,
lightweight Intrusion detection system is introduced. The
paper also tells about the different applications where snort
can be used.
It is very difficult to find the patterns of network traffic
behavior whether it is good,bad or anomalous. Data mining
is the conventional solution for this. However in paper [11]
author has discussed about the use of Genetic Programming
for the above purpose. The author also focuses on the
advantages of using Genetic Programming.
Author of the paper [13] discusses a combined approach of
Decision Tree and Support Vector Machine to model IDS.
The author concludes by proving that using the combined
approach increases the detection accuracy and minimizes the
computational complexity.
3. PROPOSED SYSTEM ARCHITECTURE
In this approach, KDD- 99 (Knowkedge Discovery and Data
Mining) which is publicly available data set that contains
information about network traffic is used. It is given as input
to C4.5 algorithm using Weka tool to build NIDS. Weka
tool is open source tool. C4.5 algorithm gives output as a
Decision Tree.
Adaboost algorithm is used to classify the network traffic as
normal or attack. It consists of 4 phases : data labeling, data
mining, training and testing. Detection result and false
alarm rate will then get displayed.
After this apriori algorithm is used to find real time evasion
and will also will generate rules for detecting attacks. After
creating these rules, the rules are then passed to snort. Snort
is an open source IDS. Snort will check for the rules and
accordingly give the output whether it Is evasion or attack
detection. Figure 1 shows the block diagram of NIDS.
Fig 1: Architecture of NIDS System
4. PROPOSED APPROACH AND ITā€™S
MODULES
4.1 Generation of Decision tree
In this project work, we take into consideration KDD
dataset. KDD has data as network traffic sessions which is
captured at different hours of a day. The traffic contains
both normal and attack traffic. In the project we have taken
into consideration only !0% traffic of the original KDD data
set, the traffic is then processed to convert the output into
binary (i.e. normal or intrusion) so that the non-numerical
fields are normalised. Weka tool [15] is used to obtain the
C4.5 based NIDS. C4.5[16] algorithm generates Decision
tree. Some attribute is taken as base to generate the Decision
Tree, this attribute is given some weight and will be used to
further classify. The type of attack will be represented by
leaf node of the decision tree. C4.5 algorithm uses the
concept of Entropy and Information Gain to construct a
Decision Tree.
To build a decision tree top-down approach is used which
means root node is found out first. C4.5 uses entropy to find
out samples with similar values that is to calculate
homogeneity of samples.
4.2 Classification of Attacks using Adaboost
Algorithm
In second module the. Adaboost algorithmis used for
classification of attack packets. It has 4 phases namely Data
labeling, data mining, training and lastly testing. In Data
labelling phase the normal packet are labelled as +1 value
and attack packet is labelled as -1 at the end which will be
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 473
the last attribute of TCP packet. Some features are extracted
from data mining phase. Then the testing of the created
NIDS is done to check for its accuracy. Adaboost algorithm
differentiates the traffic into 4 types of attacks DOS, U2R,
R2L, probe and normal packet. The output of this module is
Detection rate and false alarm rate.
4.3 To find Real Time Evasion using Apriori
Algorithm
For real time evasion NIDS is created using Apriori
algorithm. Different sessions of attacks are given as input to
Apriori algorithm. According to support and confidence
value ,rules are generated by apriori algorithm. These rules
are given to snort which is open source NIDS. When attack
is generated for which signature is stored in snort, it
generate alarm. After that we show evasion over NIDS by
changing some fields of it. If NIDS failed to generate alarm
means evasion is successful. So we found out different types
of evasion.
4.4 Comparison of Results:
Comparing Multilayer Perceptron (MLP) algorithm results
with Adaboost algorithm results MLP gives more accurate
results and minimum false rate compared to same.
5. EXPERIMENTAL RESULTS
5.1 Weka Explorer
KDD-99 cup data set which contain attack and normal
packet attack in .arff format is given as input to C4.5
algorithm through weka tool.
Fig 2: Weka explore to open dataset file
From Weka explorer we can select the algorithm. Here C4.5 or J48 algorithm is selected.From that selected algorithm the attacks
are classified and accordingly a decision tree is generated. Division of attacks are done according to some value. Nodes are
attribute by which classification is done and leaf nodes are attack names.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 474
Fig 3: Visualization of C4.5 algorithm output in tree manner
5.2 Adaboost Algorithm
It is a classification algorithm. This algorithm works along with other algorithms for generating superior results. Here attacks are
classified into 5 types DoS, Probe, R2L, U2R, normal Adaboost algorithm has 4 states labelling, data mining, training, testing.
After testing with other datasets accuracy is calculated by input and output count. Input count is number of total attacks of that
type and output count is number of attacks that are classified correctly by NIDS.
Fig 4: Adaboost output -classification of attacks, detection rate and false alarm rate
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 475
5.3 Apriori Algorithm
A real time evasion can be shown by apriori algorithm. We can select the file which contains attack sessions as input to apriori
algorithm. From the GUI we can select support and confidence values. Rules are generated by apriori algorithm by trying different
combination of attacks. Their support and confidence values are checked.
Fig 5: Association rule generation of apriori algorithm
4. Snort Output
The rules are given to snort. If the intruder generates the same attack for that a signature is stored in snort, snort generates alert
messages.
Fig 6: Alert message generated by snort on intrusion
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 476
6. CONCLUSION
Currently, NIDS are prepared to detect a huge variety of
attacks. If we consider Snort it takes into account the
possibility of being evaded with the techniques. However,
they are not prepared to find new evasive forms that can
appear. Here in this work we present a proof of concept
showing how to perform detection and evasion in NIDS
using publicly available datasets KDD-99.
In this dissertation we put forward a structure to search for
evasions over a given NIDS. This model shows how the
network data is classified by NIDS. We have shown the
effectiveness and detection rate increases when using NIDS
based on Adaboost algorithm. A real time evasion and
detection is shown by NIDS based on Apriori algorithm
which generates rules. Once this model is obtained, some
fields of the packets can be changed and we can look for
evading the NIDS detection. By this we can analyse
different pattern of evading systems. Thus an environment
to check the evasion of necessary attacks is successfully
created..
REFERENCES
[1]. R. Bace and P. Mell, "NIST Special Publication on
Intrusion Detection Systems", 800-31, 2001
[2]. T. H. Ptacek and T. N. Newsham, "Insertion, evasion
and denial of service: Eluding network intrusion detection,"
Technical report, 1998.
[3]. S. Pastrana, A. Orfila, A. Ribagorda, ā€œA Functional
Framework to Evade Network IDSā€,IEEE xplore, System
Sciences (HICSS), 2011 44th Hawaii International
Conference.
[4]. D. Son. (2002) Fragroute. [Online] http://www
monkey.org/~dugsong/fragroute/
[5]. L. Juan, C. Kreibich, C.-H. Lin, and V. Paxson, "A Tool
for Offline and Live Testing of Evasion Resilience in
Network Intrusion Detection Systems," in DIMVA '08:
Proceedings of the 5th international conference on Detection
of Intrusions and Malware, and Vulnerability Assessment,
Paris, France, 2008, pp. 267-278.
[6]. D. Watson, M. Smart, R. G. Malan, and F. Jahanian,
"Protocol scrubbing: network security through transparent
flow modification," IEEE/ACM Transactions on
Networking, vol. 12, pp. 261--273, 2004.
[7]. G. Varghese, J. A. Fingerhut, and F. Bonomi,
"Detecting evasion attacks at high speeds without
reassembly," in SIGCOMM '06: Proceedings of the 2006
conference on Applications, technologies, architectures, and
protocols for computer communications, Pisa, Italy, 2006,
pp. 327--338.
[8]. U. Shankar and V. Paxson, "Active Mapping: Resisting
NIDS Evasion without Altering Traffic," in SP '03:
Proceedings of the 2003 IEEE Symposium on Security and
Privacy, Washington, DC, USA, 2003, p. 44.
[9]. D. Mutz, C. Kruegel, W. Robertson, G. Vigna, and R.
A. Kemmerer ''Reverse Engineering of Network
Signatures'', in Proceedings of the AusCERT Asia Pacific
Information Technology Security Conference, Gold, 2005
[10]. M. Roesch, "Snort - Lightweight Intrusion Detection
for Networks," in LISA '99: Proceedings of the 13th
USENIX conference on System administration, Seattle,
Washington, 1999, pp. 229--238.
[11]. A. Orfila, A. Ribagorda, ā€œEvolving High-Speed, Easy-
to-Understand Network Intrusion Detection Rules with
Genetic Programmingā€, Springer-Verlag Berlin Heidelberg,
2009.
[12]. S. Mukkamala, A. Sung, and A. Abrham, "Modeling
intrusion detection systems using linear genetic
programming approach," in IEA/AIE'2004: Proceedings of
the 17th international conference on Innovations in applied
artificial intelligence, Ottawa, 2004, pp. 633--642.
[13]. S. Peddabachigaria, A. Abraham, ā€œModeling intrusion
detection system using hybrid intelligent systemsā€, Journal
of Network and Computer Applications.
[14]. Ferenc Bodon, ā€œA fast APRIORI implementationā€,
Informatics Laboratory, Computer and Automation
Research Institute.
[15]. M. Hall, E. Frank, G. Holmes, B. Pfahringer,
P.Reutemann, I. H. Witten, ''The WEKA Data Mining
Software: An Update'', in SIGKDD Explorations, Volume
11, Issue 1,2009.

More Related Content

What's hot

Mas based framework to protect cloud computing against ddos attack
Mas based framework to protect cloud computing against ddos attackMas based framework to protect cloud computing against ddos attack
Mas based framework to protect cloud computing against ddos attack
eSAT Journals
Ā 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
ijcsbi
Ā 
Paper id 212014100
Paper id 212014100Paper id 212014100
Paper id 212014100
IJRAT
Ā 

What's hot (15)

Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusionSoft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusion
Ā 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
Ā 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
Ā 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analytics
Ā 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
Ā 
Mas based framework to protect cloud computing against ddos attack
Mas based framework to protect cloud computing against ddos attackMas based framework to protect cloud computing against ddos attack
Mas based framework to protect cloud computing against ddos attack
Ā 
Mas based framework to protect cloud computing
Mas based framework to protect cloud computingMas based framework to protect cloud computing
Mas based framework to protect cloud computing
Ā 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
Ā 
Paper id 212014100
Paper id 212014100Paper id 212014100
Paper id 212014100
Ā 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
Ā 
DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1
Ā 
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Ā 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
Ā 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Ā 
Survey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chainSurvey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chain
Ā 

Viewers also liked

AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
Apoorv Pandey
Ā 
Ajit-Legiment_Techniques
Ajit-Legiment_TechniquesAjit-Legiment_Techniques
Ajit-Legiment_Techniques
guest66dc5f
Ā 
Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007
Stephan Chenette
Ā 
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCE
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCESENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCE
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCE
Sangeetha Sankaramahadev
Ā 

Viewers also liked (20)

Web Based Security
Web Based SecurityWeb Based Security
Web Based Security
Ā 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
Ā 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion Attacks
Ā 
Web backdoors attacks, evasion, detection
Web backdoors   attacks, evasion, detectionWeb backdoors   attacks, evasion, detection
Web backdoors attacks, evasion, detection
Ā 
Ajit-Legiment_Techniques
Ajit-Legiment_TechniquesAjit-Legiment_Techniques
Ajit-Legiment_Techniques
Ā 
Welcome to the United States: An Acculturation Conversation
Welcome to the United States: An Acculturation ConversationWelcome to the United States: An Acculturation Conversation
Welcome to the United States: An Acculturation Conversation
Ā 
The (In)Security of Topology Discovery in Software Defined Networks
The (In)Security of Topology Discovery in Software Defined NetworksThe (In)Security of Topology Discovery in Software Defined Networks
The (In)Security of Topology Discovery in Software Defined Networks
Ā 
VMRay intro video
VMRay intro videoVMRay intro video
VMRay intro video
Ā 
Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007
Ā 
Code obfuscation, php shells & more
Code obfuscation, php shells & moreCode obfuscation, php shells & more
Code obfuscation, php shells & more
Ā 
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangPractical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Ā 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
Ā 
Bsides to 2016-penetration-testing
Bsides to 2016-penetration-testingBsides to 2016-penetration-testing
Bsides to 2016-penetration-testing
Ā 
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCE
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCESENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCE
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCE
Ā 
Web attacks using obfuscated script
Web attacks using  obfuscated scriptWeb attacks using  obfuscated script
Web attacks using obfuscated script
Ā 
On deobfuscation in practice
On deobfuscation in practiceOn deobfuscation in practice
On deobfuscation in practice
Ā 
Purple teaming Cyber Kill Chain
Purple teaming Cyber Kill ChainPurple teaming Cyber Kill Chain
Purple teaming Cyber Kill Chain
Ā 
Code obfuscation
Code obfuscationCode obfuscation
Code obfuscation
Ā 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Ā 
Veil Evasion and Client Side Attacks
Veil Evasion and Client Side AttacksVeil Evasion and Client Side Attacks
Veil Evasion and Client Side Attacks
Ā 

Similar to A combined approach to search for evasion techniques in network intrusion detection system

Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
Ā 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
Ā 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
Ā 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
Ā 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
Editor IJMTER
Ā 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
voversbyobersby
Ā 

Similar to A combined approach to search for evasion techniques in network intrusion detection system (20)

A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
Ā 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
Ā 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
Ā 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Ā 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Ā 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)
Ā 
A45010107
A45010107A45010107
A45010107
Ā 
A45010107
A45010107A45010107
A45010107
Ā 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
Ā 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
Ā 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
Ā 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
Ā 
An analysis of Network Intrusion Detection System using SNORT
An analysis of Network Intrusion Detection System using SNORTAn analysis of Network Intrusion Detection System using SNORT
An analysis of Network Intrusion Detection System using SNORT
Ā 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
Ā 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
Ā 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
Ā 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
Ā 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
Ā 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
Ā 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
Ā 

More from eSAT Journals

Material management in construction ā€“ a case study
Material management in construction ā€“ a case studyMaterial management in construction ā€“ a case study
Material management in construction ā€“ a case study
eSAT Journals
Ā 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
Ā 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
Ā 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
Ā 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
Ā 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
Ā 
Material management in construction ā€“ a case study
Material management in construction ā€“ a case studyMaterial management in construction ā€“ a case study
Material management in construction ā€“ a case study
Ā 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
Ā 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
Ā 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Ā 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Ā 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Ā 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
Ā 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
Ā 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Ā 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
Ā 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
Ā 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Ā 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
Ā 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
Ā 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
Ā 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Ā 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
Ā 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
Ā 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Ā 

Recently uploaded

Call Now ā‰½ 9953056974 ā‰¼šŸ” Call Girls In New Ashok Nagar ā‰¼šŸ” Delhi door step de...
Call Now ā‰½ 9953056974 ā‰¼šŸ” Call Girls In New Ashok Nagar  ā‰¼šŸ” Delhi door step de...Call Now ā‰½ 9953056974 ā‰¼šŸ” Call Girls In New Ashok Nagar  ā‰¼šŸ” Delhi door step de...
Call Now ā‰½ 9953056974 ā‰¼šŸ” Call Girls In New Ashok Nagar ā‰¼šŸ” Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
Ā 
Call Girls in Netaji Nagar, Delhi šŸ’Æ Call Us šŸ”9953056974 šŸ” Escort Service
Call Girls in Netaji Nagar, Delhi šŸ’Æ Call Us šŸ”9953056974 šŸ” Escort ServiceCall Girls in Netaji Nagar, Delhi šŸ’Æ Call Us šŸ”9953056974 šŸ” Escort Service
Call Girls in Netaji Nagar, Delhi šŸ’Æ Call Us šŸ”9953056974 šŸ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
Ā 
Top Rated Call Girls In chittoor šŸ“± {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor šŸ“± {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor šŸ“± {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor šŸ“± {7001035870} VIP Escorts chittoor
dharasingh5698
Ā 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
Ā 

Recently uploaded (20)

Call Now ā‰½ 9953056974 ā‰¼šŸ” Call Girls In New Ashok Nagar ā‰¼šŸ” Delhi door step de...
Call Now ā‰½ 9953056974 ā‰¼šŸ” Call Girls In New Ashok Nagar  ā‰¼šŸ” Delhi door step de...Call Now ā‰½ 9953056974 ā‰¼šŸ” Call Girls In New Ashok Nagar  ā‰¼šŸ” Delhi door step de...
Call Now ā‰½ 9953056974 ā‰¼šŸ” Call Girls In New Ashok Nagar ā‰¼šŸ” Delhi door step de...
Ā 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
Ā 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
Ā 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Ā 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
Ā 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Ā 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
Ā 
Call Girls in Netaji Nagar, Delhi šŸ’Æ Call Us šŸ”9953056974 šŸ” Escort Service
Call Girls in Netaji Nagar, Delhi šŸ’Æ Call Us šŸ”9953056974 šŸ” Escort ServiceCall Girls in Netaji Nagar, Delhi šŸ’Æ Call Us šŸ”9953056974 šŸ” Escort Service
Call Girls in Netaji Nagar, Delhi šŸ’Æ Call Us šŸ”9953056974 šŸ” Escort Service
Ā 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Ā 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
Ā 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
Ā 
Top Rated Call Girls In chittoor šŸ“± {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor šŸ“± {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor šŸ“± {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor šŸ“± {7001035870} VIP Escorts chittoor
Ā 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Ā 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
Ā 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Ā 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
Ā 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Ā 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
Ā 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
Ā 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Ā 

A combined approach to search for evasion techniques in network intrusion detection system

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 471 A COMBINED APPROACH TO SEARCH FOR EVASION TECHNIQUES IN NETWORK INTRUSION DETECTION SYSTEM Rutuja R. Patil1 , P. R. Devale2 1 Research Scholar, Department of Information Technology, Bharati Vidyapeeth Deemed, University College of Engineering, Pune, Maharashtra, India 2 Professor, Department of Information, Technology, Bharati Vidyapeeth Deemed, Pune, Maharashtra, India Abstract Network Intrusion Detection Systems (NIDS) whose base is signature, works on the signature of attacks. They must be updated quickly in order to prevent the system from new attacks. The attacker finds out new evasion techniques so that he should remain undetected. As the new evasion techniques are being developed it becomes difficult for NIDS to give accurate results and NIDS may fail. The key aspect of our paper is to develop a network intrusion detection system using C4.5 algorithm where Adaboost algorithm is used to classify the packet as normal packet or attack packet and also to further classify different types of attack. Apriori algorithm is used to find real time evasion and to generate rules to find intrusion These rules are further given as input to Snort intrusion detection system for detecting different attacks. Keywords: NIDS, Evasion, Apriori Algorithm, Adaboost Algorithm, Snort ---------------------------------------------------------------------***---------------------------------------------------------------- 1. INTRODUCTION Many established businesses have to maintain a huge important information and data. Security measures should protect this information from unauthorized access. The functioning of burglar alarm in the real world can be mapped to the working of IDS function in the digital world. The conflict between the attackers and IDS developers is never ending because the attackers keep on finding new ways to get access to the system, while system developers keep on finding new ways to restrict the attackers. Intrusion is a technique where in an attacker tries to get unauthorised access into the system with wrong intention. Intrusion Detection systems (IDS) is a network security appliance that monitors network traffic as well as system activities to check for malicious activity. Intrusion Detection System can be categorized in two ways Network based (NIDS) and host based (HIDS) intrusion detection systems. 1.1 Network Based Intrusion Detection System As the packets on the network are monitored in this system so it is called as Network Based IDS. Its motive is to check whether an attacker is trying to get access to the system. The analysis of the network traffic is done in order to check for various malicious actions. These systems can be broadly classified into two major categories. These are mainly: i) Anomaly based NIDS (ii)Signature based NIDS. In this paper, we focus on Signature based NIDS. 1.2 Signature Based Intrusion Detection System The signatures of the attacks are stored in the database A signature based IDS compares these signatures with the packets on the network. Many of the antivirus software detects malware in the similar fashion. However if a new threat is discovered it will require some time span to discover the signature of the threat [2]. This situation causes attackers to find new evasions over the signatures of these systems. The overall concept of intruder is to carry out attack in a way that the Intrusion Detection System should not be able to detect it as an attack. Following is the simplified explanation of Evasion: Let us consider 2 strings ā€œ malicious ā€œ and ā€œanamalous ā€œwhich represented as known malicious code. The entry to the system is prohibited when an IDS finds these strings in the request. However if ā€œ annamil ā€œ and ā€œlousmousciā€ were part of a request, the system would not recognise it as malicious strings ā€œmalicious ā€œ and ā€œanamalous ā€œ which are merged together and reconstructed in a new form and the attacker can get access to the system. The IDS does not interfere and entry would be allowed. The effort of this project is to develop a framework that looks to find novel evasive techniques by analyzing NIDS behavior. 2. RELATED WORK Methodology of Network Intrusion Detection Evasion system is described in several papers. In paper [2] the authors proposed the concept of evasion and concludes that the evasion will be successful if the implementation of NIDS differs from the endpoint implementation.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 472 Fragroute is an evasion tool which intercepts, modifies, and rewrites the traffic which is routed for the specified host[Online]. It helps the attackers to bypass the signature matching on the NIDS. In paper[5], prototype system IDSprobe is introduced which tests the accuracy of NIDS to detect and handle evasion attacks. Author of paper [7] introduces Split Detect approach where in he focuses on splitting the signature into pieces.By splitting the signature the attacker is forced to include at least one piece of information completely and then the abnormal behavior of packets can be identified. In the article[10] Snort an open source ,cross platform, lightweight Intrusion detection system is introduced. The paper also tells about the different applications where snort can be used. It is very difficult to find the patterns of network traffic behavior whether it is good,bad or anomalous. Data mining is the conventional solution for this. However in paper [11] author has discussed about the use of Genetic Programming for the above purpose. The author also focuses on the advantages of using Genetic Programming. Author of the paper [13] discusses a combined approach of Decision Tree and Support Vector Machine to model IDS. The author concludes by proving that using the combined approach increases the detection accuracy and minimizes the computational complexity. 3. PROPOSED SYSTEM ARCHITECTURE In this approach, KDD- 99 (Knowkedge Discovery and Data Mining) which is publicly available data set that contains information about network traffic is used. It is given as input to C4.5 algorithm using Weka tool to build NIDS. Weka tool is open source tool. C4.5 algorithm gives output as a Decision Tree. Adaboost algorithm is used to classify the network traffic as normal or attack. It consists of 4 phases : data labeling, data mining, training and testing. Detection result and false alarm rate will then get displayed. After this apriori algorithm is used to find real time evasion and will also will generate rules for detecting attacks. After creating these rules, the rules are then passed to snort. Snort is an open source IDS. Snort will check for the rules and accordingly give the output whether it Is evasion or attack detection. Figure 1 shows the block diagram of NIDS. Fig 1: Architecture of NIDS System 4. PROPOSED APPROACH AND ITā€™S MODULES 4.1 Generation of Decision tree In this project work, we take into consideration KDD dataset. KDD has data as network traffic sessions which is captured at different hours of a day. The traffic contains both normal and attack traffic. In the project we have taken into consideration only !0% traffic of the original KDD data set, the traffic is then processed to convert the output into binary (i.e. normal or intrusion) so that the non-numerical fields are normalised. Weka tool [15] is used to obtain the C4.5 based NIDS. C4.5[16] algorithm generates Decision tree. Some attribute is taken as base to generate the Decision Tree, this attribute is given some weight and will be used to further classify. The type of attack will be represented by leaf node of the decision tree. C4.5 algorithm uses the concept of Entropy and Information Gain to construct a Decision Tree. To build a decision tree top-down approach is used which means root node is found out first. C4.5 uses entropy to find out samples with similar values that is to calculate homogeneity of samples. 4.2 Classification of Attacks using Adaboost Algorithm In second module the. Adaboost algorithmis used for classification of attack packets. It has 4 phases namely Data labeling, data mining, training and lastly testing. In Data labelling phase the normal packet are labelled as +1 value and attack packet is labelled as -1 at the end which will be
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 473 the last attribute of TCP packet. Some features are extracted from data mining phase. Then the testing of the created NIDS is done to check for its accuracy. Adaboost algorithm differentiates the traffic into 4 types of attacks DOS, U2R, R2L, probe and normal packet. The output of this module is Detection rate and false alarm rate. 4.3 To find Real Time Evasion using Apriori Algorithm For real time evasion NIDS is created using Apriori algorithm. Different sessions of attacks are given as input to Apriori algorithm. According to support and confidence value ,rules are generated by apriori algorithm. These rules are given to snort which is open source NIDS. When attack is generated for which signature is stored in snort, it generate alarm. After that we show evasion over NIDS by changing some fields of it. If NIDS failed to generate alarm means evasion is successful. So we found out different types of evasion. 4.4 Comparison of Results: Comparing Multilayer Perceptron (MLP) algorithm results with Adaboost algorithm results MLP gives more accurate results and minimum false rate compared to same. 5. EXPERIMENTAL RESULTS 5.1 Weka Explorer KDD-99 cup data set which contain attack and normal packet attack in .arff format is given as input to C4.5 algorithm through weka tool. Fig 2: Weka explore to open dataset file From Weka explorer we can select the algorithm. Here C4.5 or J48 algorithm is selected.From that selected algorithm the attacks are classified and accordingly a decision tree is generated. Division of attacks are done according to some value. Nodes are attribute by which classification is done and leaf nodes are attack names.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 474 Fig 3: Visualization of C4.5 algorithm output in tree manner 5.2 Adaboost Algorithm It is a classification algorithm. This algorithm works along with other algorithms for generating superior results. Here attacks are classified into 5 types DoS, Probe, R2L, U2R, normal Adaboost algorithm has 4 states labelling, data mining, training, testing. After testing with other datasets accuracy is calculated by input and output count. Input count is number of total attacks of that type and output count is number of attacks that are classified correctly by NIDS. Fig 4: Adaboost output -classification of attacks, detection rate and false alarm rate
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 475 5.3 Apriori Algorithm A real time evasion can be shown by apriori algorithm. We can select the file which contains attack sessions as input to apriori algorithm. From the GUI we can select support and confidence values. Rules are generated by apriori algorithm by trying different combination of attacks. Their support and confidence values are checked. Fig 5: Association rule generation of apriori algorithm 4. Snort Output The rules are given to snort. If the intruder generates the same attack for that a signature is stored in snort, snort generates alert messages. Fig 6: Alert message generated by snort on intrusion
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 476 6. CONCLUSION Currently, NIDS are prepared to detect a huge variety of attacks. If we consider Snort it takes into account the possibility of being evaded with the techniques. However, they are not prepared to find new evasive forms that can appear. Here in this work we present a proof of concept showing how to perform detection and evasion in NIDS using publicly available datasets KDD-99. In this dissertation we put forward a structure to search for evasions over a given NIDS. This model shows how the network data is classified by NIDS. We have shown the effectiveness and detection rate increases when using NIDS based on Adaboost algorithm. A real time evasion and detection is shown by NIDS based on Apriori algorithm which generates rules. Once this model is obtained, some fields of the packets can be changed and we can look for evading the NIDS detection. By this we can analyse different pattern of evading systems. Thus an environment to check the evasion of necessary attacks is successfully created.. REFERENCES [1]. R. Bace and P. Mell, "NIST Special Publication on Intrusion Detection Systems", 800-31, 2001 [2]. T. H. Ptacek and T. N. Newsham, "Insertion, evasion and denial of service: Eluding network intrusion detection," Technical report, 1998. [3]. S. Pastrana, A. Orfila, A. Ribagorda, ā€œA Functional Framework to Evade Network IDSā€,IEEE xplore, System Sciences (HICSS), 2011 44th Hawaii International Conference. [4]. D. Son. (2002) Fragroute. [Online] http://www monkey.org/~dugsong/fragroute/ [5]. L. Juan, C. Kreibich, C.-H. Lin, and V. Paxson, "A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems," in DIMVA '08: Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Paris, France, 2008, pp. 267-278. [6]. D. Watson, M. Smart, R. G. Malan, and F. Jahanian, "Protocol scrubbing: network security through transparent flow modification," IEEE/ACM Transactions on Networking, vol. 12, pp. 261--273, 2004. [7]. G. Varghese, J. A. Fingerhut, and F. Bonomi, "Detecting evasion attacks at high speeds without reassembly," in SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, Pisa, Italy, 2006, pp. 327--338. [8]. U. Shankar and V. Paxson, "Active Mapping: Resisting NIDS Evasion without Altering Traffic," in SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, Washington, DC, USA, 2003, p. 44. [9]. D. Mutz, C. Kruegel, W. Robertson, G. Vigna, and R. A. Kemmerer ''Reverse Engineering of Network Signatures'', in Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, Gold, 2005 [10]. M. Roesch, "Snort - Lightweight Intrusion Detection for Networks," in LISA '99: Proceedings of the 13th USENIX conference on System administration, Seattle, Washington, 1999, pp. 229--238. [11]. A. Orfila, A. Ribagorda, ā€œEvolving High-Speed, Easy- to-Understand Network Intrusion Detection Rules with Genetic Programmingā€, Springer-Verlag Berlin Heidelberg, 2009. [12]. S. Mukkamala, A. Sung, and A. Abrham, "Modeling intrusion detection systems using linear genetic programming approach," in IEA/AIE'2004: Proceedings of the 17th international conference on Innovations in applied artificial intelligence, Ottawa, 2004, pp. 633--642. [13]. S. Peddabachigaria, A. Abraham, ā€œModeling intrusion detection system using hybrid intelligent systemsā€, Journal of Network and Computer Applications. [14]. Ferenc Bodon, ā€œA fast APRIORI implementationā€, Informatics Laboratory, Computer and Automation Research Institute. [15]. M. Hall, E. Frank, G. Holmes, B. Pfahringer, P.Reutemann, I. H. Witten, ''The WEKA Data Mining Software: An Update'', in SIGKDD Explorations, Volume 11, Issue 1,2009.