AUTOMATED SIGNATURE CREATOR FOR A SIGNATURE BASED INTRUSION DETECTION SYSTEM (PANCAKES)
Proceeding: The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec)Publication Date: 2013-03-04
Authors : Frances Bernadette De Ocampo Trisha Mari L. Del Castillo Gomez Miguel Alberto N;
Page : 198-205
Keywords : Anomaly-Based Intrusio n Detection System; Network-Based Attacks; Feature Extraction; Network Attributes; and Machine Learning Algorithm;
Abstract
A Signature-based Intrusion Detection System (IDS) helps in maintaining the integrity of data in a network controlled environment. Unfortunately, this type of IDS depends on predetermined intrusion patterns that are manually created. If the signature database of the Signature-based IDS is not updated, network attacks just pass through this type of IDS without being noticed. To avoid this, an Anomaly-based IDS is used in order to countercheck if a network traffic that is not detected by Signature-based IDS is a true malicious traffic or not. In doing so, the Anomaly-based IDS might come up with several numbers of logs containing numerous network attacks which could possibly be a false positive. This is the reason why the Anomaly-based IDS is not perfect, it would readily alarm the system that a network traffic is an attack just because it is not on its baseline. In order to resolve the problem between these two IDSs, the goal is to correlate data between the logs of the Anomaly-based IDS and the packet that has been captured in order to determine if a network traffic is really malicious or not. With the supervision of a security expert, the malicious network traffic would be verified as malicious. Using machine learning, the researchers can identify which algorithm is better than the other algorithms in classifying if a certain network traffic is really malicious. Upon doing so, the creation of signatures would follow by basing the automated creation of signatures from the detected malicious traffic.
Other Latest Articles
- RAM FORENSICS AGAINST CYBER CRIMES INVOLVING FILES
- AUTOMATED MALWARE DETECTION FOR ANDROID AMDA
- CANARY FILES: GENERATING FAKE FILES TO DETECT CRITICAL DATA LOSS FROM COMPLEX COMPUTER NETWORKS
- INDUSTRIAL ESPIONAGE THREATS IN CORPORATE SOUTH AFRICA
- DIGITAL BANKING SECURITY, RISK AND CREDIBILITY CONCERNS IN SOUTH AFRICA
Last modified: 2013-06-18 22:05:50