Design and implementation of an anomaly-based network intrusion detection system utilizing the DNA model

被引:0
|
作者
Mahdy, Riham [1 ]
Saeb, Magdy [1 ]
机构
[1] Arab Acad Sci Technol & Maritime Transport, Dept Comp Engn, Sch Engn, Alexandria, Egypt
关键词
FPGA; anomaly identification; network intrusion detection; DNA computing; pattern matching; bioinformatics;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The genetic material that encodes the unique characteristics of each individual such as gender, eye color, and other human features is the well-known DNA. In this work, we introduce an anomaly intrusion detection system, built on the notion of a DNA sequence or gene, which is responsible for the normal network traffic patterns. Subsequently, the system detects suspicious activities by searching the "normal behavior DNA sequence" through string matching. On the other hand, string matching is a computationally intensive task and can be converted into a potential bottleneck without high-speed processing. Furthermore, conventional software-implemented string matching algorithms have not kept pace with the ever increasing network speeds. As a result, we adopt a monitoring phase that is hardware-implemented with the intention that DNA pattern matching is performed at wire-speed. Finally, we provide the details of our FPGA implementation of the bioinformatics-based string matching technique.
引用
收藏
页码:470 / 476
页数:7
相关论文
共 50 条
  • [1] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [2] DESIGN AND IMPLEMENTATION OF AN ANOMALY-BASED INTRUSION DETECTION SYSTEM FOR WIRELESS INDUSTRIAL NETWORKS
    Wei, Min
    Kim, Keecheon
    Wang, Ping
    [J]. FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2012), 2012, : 879 - 886
  • [3] ANOMALY-BASED NETWORK INTRUSION DETECTION METHODS
    Nevlud, Pavel
    Bures, Miroslav
    Kapicak, Lukas
    Zdralek, Jaroslav
    [J]. ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 11 (06) : 468 - 474
  • [4] Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network
    Kumar, Prabhat
    Gupta, Govind P.
    Tripathi, Rakesh
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (02) : 137 - 147
  • [5] LSTM for Anomaly-Based Network Intrusion Detection
    Althubiti, Sara A.
    Jones, Eric Marcell, Jr.
    Roy, Kaushik
    [J]. 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 293 - 295
  • [6] Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network
    Govind P. Prabhat Kumar
    Rakesh Gupta
    [J]. Automatic Control and Computer Sciences, 2021, 55 : 137 - 147
  • [7] An anomaly-based Network Intrusion Detection System using Deep learning
    Nguyen Thanh Van
    Tran Ngoc Thinh
    Le Thanh Sach
    [J]. 2017 INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND ENGINEERING (ICSSE), 2017, : 210 - 214
  • [8] Anomaly-Based Network Intrusion Detection Using SVM
    Zhang, Yuan
    Yang, Qinghai
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos
    Ghafir, Ibrahim
    AsSadhan, Basil
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [9] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [10] POSEIDON: a 2-tier anomaly-based network intrusion detection system
    Bolzoni, Damiano
    Etalle, Sandro
    Hartel, Pieter
    Zambon, Emmanuele
    [J]. FOURTH IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2006, : 144 - +