Rule-Based Network Intrusion Detection System for Port Scanning with Efficient Port Scan Detection Rules Using Snort

被引:17
|
作者
Patel, Satyendra Kumar [1 ]
Sonker, Abhilash [2 ]
机构
[1] Madhav Inst Sci & Technol, Technol, Dept CSE & IT, Gwalior 474005, India
[2] Madhav Inst Sci & Technol, Dept CSE & IT, Gwalior 474005, India
关键词
Network security; Intrusion Detection System (IDS); Network Intrusion Detection System (NIDS); Snort; Port Scan; Efficient Port Scan Detection Rules (EPSDR); Basic Analysis Security Engine (BASE);
D O I
10.14257/ijfgcn.2016.9.6.32
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In the field of network security, researchers have implemented different models to secure the network. Intrusion Detection System is also one of them and Snort is an open source tool for Intrusion Detection and Prevention System. Today intrusion Detection System is a growing technology in network security and mostly researchers have focused in this field, some of them used signature or rule-based technique and some are anomaly based techniques to improve security of network. In this paper we propose a rule-base Intrusion Detection System with our self generated new Efficient Port Scan Detection Rules (EPSDR). These rules will be used to detect naive port scan attacks in real time network using Snort and Basic Analysis Security Engine (BASE). BASE is used to view the snort results in font-end web page because Snort has no graphic user interface. In This rule-based Intrusion Detection System we will match the signature with our Efficient Port Scan Detection Rules (EPSDR) from captured packet. As a definition of signature based IDS this new EPSDR based IDS will be useful to reduce the false positive alarm.
引用
收藏
页码:339 / 350
页数:12
相关论文
共 50 条
  • [11] Building agents for rule-based intrusion detection system
    Jha, S
    Hassan, M
    [J]. COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1366 - 1373
  • [12] A Novel Rule-based Intrusion Detection System Using Data Mining
    Li, Lei
    Yang, De-Zhang
    Shen, Fang-Cheng
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 169 - 172
  • [13] Interactive visualization for network and port scan detection
    Muelder, C
    Ma, KL
    Bartoletti, T
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, 2006, 3858 : 265 - 283
  • [14] A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence
    Liu, Tao
    Zhang, Da
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS, NETWORK AND COMPUTER ENGINEERING (ICENCE 2016), 2016, 67 : 769 - 775
  • [15] Port Scanning Detection Based on Anomalies
    Ananin, Evgeny V.
    Nikishova, Arina V.
    Kozhevnikova, Irina S.
    [J]. 2017 XI INTERNATIONAL IEEE SCIENTIFIC AND TECHNICAL CONFERENCE DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2017,
  • [16] Analysis of Intrusion Detection System Performance for the Port Scan Attack Detector, Portsentry, and Suricata
    Ernawati, T.
    Fachrozi, M. F.
    Syaputri, D. D.
    [J]. 2ND INTERNATIONAL CONFERENCE ON INFORMATICS, ENGINEERING, SCIENCE, AND TECHNOLOGY (INCITEST 2019), 2019, 662
  • [17] Building intrusion pattern miner for Snort network intrusion detection system
    Wuu, Lih-Chyau
    Hung, Chi-Hsiang
    Chen, Sout-Fong
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (10) : 1699 - 1715
  • [18] Building intrusion pattern miner for snort network intrusion detection system
    Wuu, LC
    Chen, SF
    [J]. 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 477 - 484
  • [19] Intrusion Detection Using Rule-Based Machine Learning Algorithms
    Kshirsagar, Deepak
    Shaikh, Jahed Momin
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [20] An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System
    Arifianto, Ridho Maulana
    Sukarno, Parman
    Jadied, Erwid Musthofa
    [J]. 2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 409 - 415