A distributed intrusion detection model for the domain name system

被引:0
|
作者
Chen, CS [1 ]
Tseng, SS [1 ]
Liu, CL [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Sci, Hsinchu 300, Taiwan
关键词
DoS; DNS; distributed two-phase DNS anomaly detection; IDS; two-phase anomaly detection algorithms;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We have investigated the problem of detecting DoS-like DNS anomalies in DNS system. In this paper, we propose a distributed Two-phase DNS anomaly detection model for solving the problem. Three sets of algorithms corresponding to different configurations are proposed, including one sequential algorithm and two distributed algorithms, each with an increasing level of parallelism. The complexity of these algorithms have been found to be O (n l(og)n). The distributed algorithms show at least a constant (1-1/C-k), C-k > 1, improvement over the sequential one. To evaluate the performance, we have implemented the algorithms and applied them to a number of examples. The experimental result shows a speed up of about 1.68 on the test example for running on an enhanced distributed architecture with C-IDS over the sequential one. A higher speedup might be common because DNS anomalies will make the traffic distribution more concentrated on the outliers, and the computation will usually converge much more quickly.
引用
收藏
页码:999 / 1009
页数:11
相关论文
共 50 条
  • [31] Distributed Intrusion Detection Model in Wireless Sensor Network
    Zhang, Hanqing
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2015, 11 (09) : 61 - 66
  • [32] A Model for Adaptive and Distributed Intrusion Detection for Cloud Computing
    Ibrahim, Nurudeen Mahmud
    Zainal, Anazida
    [J]. 2018 SEVENTH ICT INTERNATIONAL STUDENT PROJECT CONFERENCE (ICT-ISPC), 2018, : 12 - +
  • [33] Distributed intrusion detection system based on fuzzy rules
    Qiao, Peili
    Su, Jie
    Liu, Yahui
    [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
  • [34] A Distributed Intrusion Detection System Based on Mobile Agents
    Mo Xiu-liang
    Wang Chun-dong
    Wang Huai-bin
    [J]. PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 2110 - 2114
  • [35] A Distributed Intrusion Detection System for Industrial Automation Networks
    Schuster, Franka
    Paul, Andreas
    [J]. 2012 IEEE 17TH CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (ETFA), 2012,
  • [36] A safe mobile agent system for distributed intrusion detection
    Zhong, SC
    Song, QF
    Cheng, XC
    Zhang, Y
    [J]. 2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 2009 - 2014
  • [37] Distributed Intrusion Detection System using Mobile Agents
    Trivedi, Bhushan
    Rajput, Jayant
    Dwivedi, Chintan
    Jobanputra, Pinky
    [J]. COMPUTING, COMMUNICATION, AND CONTROL, 2011, 1 : 57 - 61
  • [38] Distributed intrusion detection system based on Windows registry
    Zhang, Xue-Qin
    Lin, Jia-Jun
    [J]. Huadong Ligong Daxue Xuebao /Journal of East China University of Science and Technology, 2004, 30 (06): : 677 - 681
  • [39] Distributed Intrusion Detection System for Wireless Sensor Networks
    Medhat, Karen
    Ramadan, Rabie A.
    Talkhan, Ihab
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 234 - 239
  • [40] Agent Based Distributed Intrusion Detection System (ABDIDS)
    Yu Lasheng
    Mutimukwe, Chantal
    [J]. PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 134 - 138