IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack

被引:3
|
作者
Fadhlillah, Aghnia [1 ]
Karna, Nyoman [1 ]
Irawan, Arif [1 ]
机构
[1] Telkom Univ, Sch Elect Engn, Bandung, Indonesia
关键词
Intrusion Detection System; Anomaly-based; Cybersecurity; Denial of Service;
D O I
10.1109/IoTaIS50849.2021.9359719
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion Detection System (IDS) is a system that could detect suspicious activity in a network. Two approaches are known for IDS, namely signature-based and anomaly-based. The anomaly-based detection method was chosen to detect suspicious and abnormal activity for the system that cannot be performed by the signature-based method. In this study, attack testing was carried out using three DoS tools, namely the LOIC, Torshammer, and Xerxes tools, with a test scenario using IDS and without IDS. From the test results that have been carried out, IDS has successfully detected the attacks that were sent, for the delivery of the most consecutive attack packages, namely Torshammer, Xerxes, and LOIC. In the detection of Torshammer attack tools on the target FTP Server, 9421 packages were obtained, for Xerxes tools as many as 10618 packages and LOIC tools as many as 6115 packages. Meanwhile, attacks on the target Web Server for Torshammer tools were 299 packages, for Xerxes tools as many as 530 packages, and for LOIC tools as many as 103 packages. The accuracy of the IDS performance results is 88.66%, the precision is 88.58% and the false positive rate is 63.17%.
引用
收藏
页码:18 / 22
页数:5
相关论文
共 50 条
  • [31] Performance Analysis of Anomaly-Based Network Intrusion Detection Using Feature Selection and Machine Learning Techniques
    Seniaray, Sumedha
    Jindal, Rajni
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2024, : 2321 - 2351
  • [32] Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
    Bolzoni, Damiano
    Etalle, Sandro
    Hartel, Pieter H.
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 1 - 20
  • [33] Anomaly-based intrusion detection using Bayesian networks
    Tylman, Wojciech
    [J]. DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 211 - +
  • [34] Anomaly-Based Network Intrusion Detection Using SVM
    Zhang, Yuan
    Yang, Qinghai
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos
    Ghafir, Ibrahim
    AsSadhan, Basil
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [35] Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques
    Agostinello, Davide
    Genovese, Angelo
    Piuri, Vincenzo
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 267 - 275
  • [36] Personal anomaly-based intrusion detection smart card using behavioural analysis
    Rossudowski, A. M.
    Venter, H. S.
    Eloff, J. H. P.
    [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 217 - +
  • [37] An Anomaly Behavior based Detection and Prevention of DoS Attack in IoT Environment
    Kumar, S. Santhosh
    Kulothungan, K.
    [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 287 - 292
  • [38] Performance Analysis and Comparison of Anomaly-based Intrusion Detection in Vehicular Ad hoc Networks
    Shams, Erfan A.
    Ulusoy, Ali Hakan
    Rizaner, Ahmet
    [J]. RADIOENGINEERING, 2020, 29 (04) : 664 - 671
  • [39] An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems
    Chae, Younghun
    Katenka, Natallia
    DiPippo, Lisa
    [J]. 2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, : 221 - 224
  • [40] Smart home anomaly-based IDS: Architecture proposal and case study
    Lara, Agustin
    Mayor, Vicente
    Estepa, Rafael
    Estepa, Antonio
    Diaz-Verdejo, Jesus E.
    [J]. INTERNET OF THINGS, 2023, 22