Efficient Snort Rule Generation using Evolutionary computing for Network Intrusion Detection

被引:4
|
作者
Muthuregunathan, Raghavan [1 ]
Siddharth, S. [1 ]
Srivathsan, R. [1 ]
Rajesh, S. R. [1 ]
机构
[1] Anna Univ, Madras Inst Technol, Madras 600025, Tamil Nadu, India
关键词
Network Intrusion Detection; Clustering; Genetic Algorithm; Hill Climbing; parallel Computing; Snort; Grid;
D O I
10.1109/CICSYN.2009.19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network Intrusion Detection (NIDS) tool has become an important tool in detecting malicious activities in a network. Snort is a free and open source Network Intrusion Detection and prevention tool which is basically a rule driven system. Hence rule development for such NIDS tools becomes a sensitive task. Clustering techniques had been widely used to cluster the network traffic and to derive rule sets based on the resultant clusters. We propose a parallel Clustering technique followed by usage of evolutionary computing comprising of Genetic Algorithm and Hill climbing to optimize the clusters formed. Rules are generated by analyzing each individual clusters formed The proposed system was specifically developed with a view to generate rule set for Snort based IDS efficiently. The results show that careful selection of fitness function could improve the efficiency of rule set generated The computing power offered by Grid is used to accomplish the parallel computing task. Parallel Computation requires Cluster based resources which are offered by Grid.
引用
收藏
页码:336 / 341
页数:6
相关论文
共 50 条
  • [21] Improving the Performance of the Snort Intrusion Detection Using Clonal Selection
    Elshafie, Hussein M.
    Mahmoud, Tarek M.
    Ali, Abdelmgeid A.
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN COMPUTER ENGINEERING (ITCE 2019), 2019, : 104 - 110
  • [22] Automated Flow-based Rule Generation for Network Intrusion Detection Systems
    Fallahi, Naser
    Sami, Ashkan
    Tajbakhsh, Morteza
    2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 1948 - 1953
  • [23] Campus Network Security Program Based on Snort Network Security Intrusion Detection System
    Ling, Jia
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 3235 - 3240
  • [24] An efficient network intrusion detection
    Chen, Chia-Mei
    Chen, Ya-Lin
    Lin, Hsiao-Chung
    COMPUTER COMMUNICATIONS, 2010, 33 (04) : 477 - 484
  • [25] Online rule generation model for intrusion detection
    State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093, China
    不详
    Jisuanji Xuebao, 2006, 9 (1523-1532):
  • [26] Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in Fog computing
    Chen, Yi
    Lin, Qiuzhen
    Wei, Wenhong
    Ji, Junkai
    Wong, Ka-Chun
    Coello Coello, Carlos A.
    KNOWLEDGE-BASED SYSTEMS, 2022, 244
  • [27] Dynamic Rule Generation for SCADA Intrusion Detection
    Nivethan, Jeyasingam
    Papa, Manioc
    2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
  • [28] Improving Intrusion Detection System Based on Snort Rules for Network Probe Attack Detection
    Khamphakdee, Nattawat
    Benjamas, Nunnapus
    Saiyod, Saiyan
    2014 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2014,
  • [29] An Efficient Anomaly Intrusion Detection Method With Feature Selection and Evolutionary Neural Network
    Sarvari, Samira
    Sani, Nor Fazlida Mohd
    Hanapi, Zurina Mohd
    Abdullah, Mohd Taufik
    IEEE ACCESS, 2020, 8 : 70651 - 70663
  • [30] Late Breaking Results: Scalable and Efficient Hyperdimensional Computing for Network Intrusion Detection
    Wang, Junyao
    Chen, Hanning
    Issa, Mariam
    Huang, Sitao
    Imani, Mohsen
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,