Rule-Based Network Intrusion Detection System for Port Scanning with Efficient Port Scan Detection Rules Using Snort

被引:17
|
作者
Patel, Satyendra Kumar [1 ]
Sonker, Abhilash [2 ]
机构
[1] Madhav Inst Sci & Technol, Technol, Dept CSE & IT, Gwalior 474005, India
[2] Madhav Inst Sci & Technol, Dept CSE & IT, Gwalior 474005, India
关键词
Network security; Intrusion Detection System (IDS); Network Intrusion Detection System (NIDS); Snort; Port Scan; Efficient Port Scan Detection Rules (EPSDR); Basic Analysis Security Engine (BASE);
D O I
10.14257/ijfgcn.2016.9.6.32
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In the field of network security, researchers have implemented different models to secure the network. Intrusion Detection System is also one of them and Snort is an open source tool for Intrusion Detection and Prevention System. Today intrusion Detection System is a growing technology in network security and mostly researchers have focused in this field, some of them used signature or rule-based technique and some are anomaly based techniques to improve security of network. In this paper we propose a rule-base Intrusion Detection System with our self generated new Efficient Port Scan Detection Rules (EPSDR). These rules will be used to detect naive port scan attacks in real time network using Snort and Basic Analysis Security Engine (BASE). BASE is used to view the snort results in font-end web page because Snort has no graphic user interface. In This rule-based Intrusion Detection System we will match the signature with our Efficient Port Scan Detection Rules (EPSDR) from captured packet. As a definition of signature based IDS this new EPSDR based IDS will be useful to reduce the false positive alarm.
引用
收藏
页码:339 / 350
页数:12
相关论文
共 50 条
  • [1] Efficient Snort Rule Generation using Evolutionary computing for Network Intrusion Detection
    Muthuregunathan, Raghavan
    Siddharth, S.
    Srivathsan, R.
    Rajesh, S. R.
    [J]. 2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 336 - 341
  • [2] Improving Intrusion Detection System Based on Snort Rules for Network Probe Attack Detection
    Khamphakdee, Nattawat
    Benjamas, Nunnapus
    Saiyod, Saiyan
    [J]. 2014 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2014,
  • [3] Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System
    Fries, Terrence P.
    [J]. WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 172 - 177
  • [4] A Study on Risk Index to Analyze the Impact of Port Scan and to Detect Slow Port Scan in Network Intrusion Detection
    Park, Seongchul
    Kim, Juntae
    [J]. ADVANCED SCIENCE LETTERS, 2017, 23 (10) : 10329 - 10336
  • [5] Internet Protocol Identification Number based Ideal Stealth Port Scan Detection using Snort
    Patel, Satyendra Kumar
    Sonker, Abhilash
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2016, : 422 - 427
  • [6] Fuzzy Logic Based Intrusion Detection System as a Service for Malicious Port Scanning Traffic Detection
    Saidi, Firas
    Trabelsi, Zouheir
    Ben Ghazela, Henda
    [J]. 2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [7] MEASURING INCONSISTENCY IN A NETWORK INTRUSION DETECTION RULE SET BASED ON SNORT
    Mcareavey, Kevin
    Liu, Weiru
    Miller, Paul
    Mu, Kedian
    [J]. INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2011, 5 (03) : 281 - 322
  • [8] Ontology-Based Layered Rule-Based Network Intrusion Detection System for Cybercrimes Detection
    Ayo, Femi Emmanuel
    Awotunde, Joseph Bamidele
    Ogundele, Lukman Adebayo
    Solanke, Olakunle Olugbenga
    Brahma, Biswajit
    Panigrahi, Ranjit
    Bhoi, Akash Kumar
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2024, 66 (06) : 3355 - 3392
  • [9] Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining
    Khamphakdee, Nattawat
    Benjamas, Nunnapus
    Saiyod, Saiyan
    [J]. JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2015, 8 (03) : 234 - 250
  • [10] Rule generalisation in intrusion detection systems using SNORT
    Aickelin, Uwe
    Twycross, Jamie
    Hesketh-Roberts, Thomas
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) : 101 - 116