The use of distributed network-based IDS systems in detection of evasion attacks

被引:0
|
作者
Basicevic, I [1 ]
Popovic, M [1 ]
Kovacevic, V [1 ]
机构
[1] Univ Novi Sad, Fac Tech Sci, Novi Sad 21000, Serbia Monteneg
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper discusses some problems in use of Intrusion Detection Systems (IDS), especially related to evasion attacks. Important characteristics of this type of attacks are presented, and possibilities for attack analyzed Further along, characteristics Of network and host based IDS systems are compared, and some aspects of distributed approach to architecture of IDS are analyzed. On the basis of such discussion, paper proposes use of distributed network based IDS systems, which are client based, in detection of evasion attacks. Proposed model is compared to host based Intrusion Prevention Systems (HIPS). Important characteristics of the model are discussed. Some implementation issues are presented.
引用
收藏
页码:78 / 82
页数:5
相关论文
共 50 条
  • [41] Research Trends in Network-Based Intrusion Detection Systems: A Review
    Kumar, Satish
    Gupta, Sunanda
    Arora, Sakshi
    [J]. IEEE ACCESS, 2021, 9 : 157761 - 157779
  • [42] A Neural Network-Based Learning Algorithm for Intrusion Detection Systems
    Hassan I. Ahmed
    Nawal A. Elfeshawy
    S. F. Elzoghdy
    Hala S. El-sayed
    Osama S. Faragallah
    [J]. Wireless Personal Communications, 2017, 97 : 3097 - 3112
  • [43] A Neural Network-Based Learning Algorithm for Intrusion Detection Systems
    Ahmed, Hassan I.
    Elfeshawy, Nawal A.
    Elzoghdy, S. F.
    El-sayed, Hala S.
    Faragallah, Osama S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 3097 - 3112
  • [44] Domain Adversarial Neural Network-Based Intrusion Detection System for In-Vehicle Network Variant Attacks
    Wei, Jingwen
    Chen, Ye
    Lai, Yingxu
    Wang, Yuhang
    Zhang, Zhaoyi
    [J]. IEEE COMMUNICATIONS LETTERS, 2022, 26 (11) : 2547 - 2551
  • [45] DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System
    Aldhaheri, Sahar
    Alghazzawi, Daniyal
    Cheng, Li
    Alzahrani, Bander
    Al-Barakati, Abdullah
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (06):
  • [46] Distributed Detection of Covert Attacks for Interconnected Systems
    Barboni, Angelo
    Rezaee, Hamed
    Boem, Francesca
    Parisini, Thomas
    [J]. 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 2240 - 2245
  • [47] Network-based Distributed Mobility Management for Network Mobility
    Ernest, Petro P.
    Chan, H. Anthony
    Falowo, Olabisi E.
    Magagula, Linoh A.
    Cespedes, Sandra
    [J]. 2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
  • [48] Network-based filtering for 2D Markov jump systems with deception attacks
    Badie, Khalid
    Chalh, Zakaria
    [J]. MULTISCALE AND MULTIDISCIPLINARY MODELING EXPERIMENTS AND DESIGN, 2024, 7 (03) : 3069 - 3081
  • [49] A novel hybrid intrusion detection system (Ids) for the detection of internet of things (IoT) network attacks
    Ramadan, Rabie A.
    Yadav, Kusum
    [J]. Annals of Emerging Technologies in Computing, 2020, 4 (05) : 61 - 74
  • [50] Mitigating Performance Degradation of Network-Based Control Systems under Denial of Service Attacks
    Long, Men
    Wu, Chwan-Hwa 'John'
    Hung, John Y.
    Irwin, J. David
    [J]. IECON 2004: 30TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOL 3, 2004, : 2339 - 2342