earticle

논문검색

A Hybrid Mitigation Technique for Malicious Network Traffic based on Active Response

초록

영어

The rapid increase in advanced persistent threats in the cyber space engenders full attention to the use of intrusion detection with emphasis on Artificial Intelligence-based intrusion detection systems as a mitigation mechanism. The sharp increase in attack surfaces can be partially attributed to the fact that Internet becomes the de facto means of converged communications and online transactions accommodating different types of services under the same scheme. Most current intrusion detection systems (IDS) deploy signature patterns of known attacks and anomaly detection approaches in detecting intrusions in an attempt to reduce the computational complexity introduced by large scale data sets. However, these approaches have been proved to be inadequate to detect novel attacks often resulting in a high false positive rate. This research will therefore seek to address the issue of detecting persistent network threats by combining the approaches of misuse and anomaly detection in one system. Our algorithm incorporates the concept of active response against all four broad attack types analyzed in the literature to realize another algorithm for intrusion detection and prevention as well as active response called HYBRITQ-4. The algorithm introduces a mechanism for classifying packets based on protocol information to enhance pattern searches and matching when detecting abnormal packets. Findings from our investigation suggest that the proposed algorithm can efficiently improve the detection rate, false positive rate and accuracy of detecting intrusions in patterns of known and novel attacks.

목차

Abstract
 1. Introduction
 2. Related Literature
  2.1. Intrusion Detection and Prevention Techniques
  2.2. Existing intrusion detection systems and their limitations
 3. Classes of Attack Vectors and Vulnerabilities
 4. Experimentation
  4.1. Components of the Algorithm
  4.2. The Algorithm’s Architecture
  4.3. Cross Validation Test
  4.4. Experimental Results and Discussion
  4.5. Comparison of Results
 5. Conclusion
 References

저자정보

  • Ayei E. Ibor Department of Computer Science, Cross River University of Technology, Calabar, Nigeria
  • Gregory Epiphaniou Cyber Security Technical Consultant, QA Limited, St. Katharine’s Way, London, United Kingdom

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.