The use of distributed network-based IDS systems in detection of evasion attacks

被引:0
|
作者
Basicevic, I [1 ]
Popovic, M [1 ]
Kovacevic, V [1 ]
机构
[1] Univ Novi Sad, Fac Tech Sci, Novi Sad 21000, Serbia Monteneg
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper discusses some problems in use of Intrusion Detection Systems (IDS), especially related to evasion attacks. Important characteristics of this type of attacks are presented, and possibilities for attack analyzed Further along, characteristics Of network and host based IDS systems are compared, and some aspects of distributed approach to architecture of IDS are analyzed. On the basis of such discussion, paper proposes use of distributed network based IDS systems, which are client based, in detection of evasion attacks. Proposed model is compared to host based Intrusion Prevention Systems (HIPS). Important characteristics of the model are discussed. Some implementation issues are presented.
引用
收藏
页码:78 / 82
页数:5
相关论文
共 50 条
  • [21] Investigating the practicality of adversarial evasion attacks on network intrusion detection
    Merzouk, Mohamed Amine
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    [J]. ANNALS OF TELECOMMUNICATIONS, 2022, 77 (11-12) : 763 - 775
  • [22] Investigating the practicality of adversarial evasion attacks on network intrusion detection
    Mohamed Amine Merzouk
    Frédéric Cuppens
    Nora Boulahia-Cuppens
    Reda Yaich
    [J]. Annals of Telecommunications, 2022, 77 : 763 - 775
  • [23] Characterizing the Effectiveness of Network-based Intrusion Detection Systems
    Ficke, Eric
    Schweitzer, Kristin M.
    Bateman, Raymond M.
    Xu, Shouhuai
    [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 76 - 81
  • [24] Evasion Attacks Based on Wasserstein Generative Adversarial Network
    Zhang, Jinlan
    Yan, Qiao
    Wang, Mingde
    [J]. 2019 COMPUTING, COMMUNICATIONS AND IOT APPLICATIONS (COMCOMAP), 2019, : 454 - 459
  • [25] Detection and Isolation of DoS and Integrity Cyber Attacks in Cyber-Physical Systems with a Neural Network-Based Architecture
    Paredes, Carlos M.
    Martinez-Castro, Diego
    Ibarra-Junquera, Vrani
    Gonzalez-Potes, Apolinar
    [J]. ELECTRONICS, 2021, 10 (18)
  • [26] A Network-based Event Detection Module Using NTP for Cyber Attacks on IoT
    Kawamura, Tamotsu
    Fukushi, Masaru
    Hirano, Yasushi
    Fujita, Yusuke
    Hamamoto, Yoshihiko
    [J]. 2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 86 - 91
  • [27] Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in SDN Environments
    Hannache, Oussama
    Batouche, Mohamed Chaouki
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (03) : 50 - 71
  • [28] Network-based filtering for positive systems with random communication delays and deception attacks
    Zhang, Dawei
    Xie, Jiyang
    Ning, Boda
    [J]. NEUROCOMPUTING, 2020, 400 : 450 - 457
  • [29] Network Security Model for Analyzing Network-Based Control Systems under Denial of Service Attacks
    Long, Men
    Wu, Chwan-Hwa 'John'
    Hung, John Y.
    Irwin, J. David
    [J]. IECON 2004: 30TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOL 3, 2004, : 2739 - 2744
  • [30] The impact of flooding attacks on network-based services
    Jensen, Meiko
    Gruschka, Nils
    Luttenberger, Norbert
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 509 - +