IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack

被引:3
|
作者
Fadhlillah, Aghnia [1 ]
Karna, Nyoman [1 ]
Irawan, Arif [1 ]
机构
[1] Telkom Univ, Sch Elect Engn, Bandung, Indonesia
关键词
Intrusion Detection System; Anomaly-based; Cybersecurity; Denial of Service;
D O I
10.1109/IoTaIS50849.2021.9359719
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion Detection System (IDS) is a system that could detect suspicious activity in a network. Two approaches are known for IDS, namely signature-based and anomaly-based. The anomaly-based detection method was chosen to detect suspicious and abnormal activity for the system that cannot be performed by the signature-based method. In this study, attack testing was carried out using three DoS tools, namely the LOIC, Torshammer, and Xerxes tools, with a test scenario using IDS and without IDS. From the test results that have been carried out, IDS has successfully detected the attacks that were sent, for the delivery of the most consecutive attack packages, namely Torshammer, Xerxes, and LOIC. In the detection of Torshammer attack tools on the target FTP Server, 9421 packages were obtained, for Xerxes tools as many as 10618 packages and LOIC tools as many as 6115 packages. Meanwhile, attacks on the target Web Server for Torshammer tools were 299 packages, for Xerxes tools as many as 530 packages, and for LOIC tools as many as 103 packages. The accuracy of the IDS performance results is 88.66%, the precision is 88.58% and the false positive rate is 63.17%.
引用
收藏
页码:18 / 22
页数:5
相关论文
共 50 条
  • [1] A transparent and scalable anomaly-based DoS detection method
    Joldzic, Ognjen
    Djuric, Zoran
    Vuletic, Pavle
    [J]. COMPUTER NETWORKS, 2016, 104 : 27 - 42
  • [2] Collaborative anomaly-based attack detection
    Gamer, Thomas
    Scharf, Michael
    Schoeller, Marcus
    [J]. SELF-ORGANIZING SYSTEMS, PROCEEDINGS, 2007, 4725 : 280 - +
  • [3] Optimizing anomaly-based attack detection using classification machine learning
    Gouda, Hany Abdelghany
    Ahmed, Mohamed Abdelslam
    Roushdy, Mohamed Ismail
    [J]. NEURAL COMPUTING & APPLICATIONS, 2024, 36 (06): : 3239 - 3257
  • [4] An Anomaly Based VoIP DoS Attack Detection and Prevention Method Using Fuzzy Logic
    Hosseinpour, Mahsa
    Moghaddam, Mohammad Hossein Yaghmaee
    Seno, Seyed Amin Hosseini
    Roshkhari, Hossein Khosravi
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 713 - 718
  • [5] Optimizing anomaly-based attack detection using classification machine learning
    Hany Abdelghany Gouda
    Mohamed Abdelslam Ahmed
    Mohamed Ismail Roushdy
    [J]. Neural Computing and Applications, 2024, 36 : 3239 - 3257
  • [6] Unknown Attacks Detection Using Feature Extraction from Anomaly-based IDS Alerts
    Sato, Masaaki
    Yamaki, Hirofumi
    Takakura, Hiroki
    [J]. 2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, : 273 - 277
  • [7] Accelerating anomaly-based IDS using Neural Network on GPU
    Nguyen Thi Thanh Van
    Tran Ngoc Thinh
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2015, : 67 - 74
  • [8] An Anomaly-Based IDS Framework Using Centroid-Based Classification
    Lin, Iuon-Chang
    Chang, Ching-Chun
    Peng, Chih-Hsiang
    [J]. SYMMETRY-BASEL, 2022, 14 (01):
  • [9] DoS and DDoS Attack Detection Using Deep Learning and IDS
    Shurman, Mohammad
    Khrais, Rami
    Yateem, Abdulrahman
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (4A) : 655 - 661
  • [10] HA-IDS: A Heterogeneous Anomaly-based Intrusion Detection System
    Chau Tran
    Tran Nguyen Vo
    Tran Ngoc Thinh
    [J]. 2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 156 - 161