SlideShare a Scribd company logo
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
DOI : 10.5121/ijsptm.2015.4104 31
INTRUSION DETECTION SYSTEM – A
STUDY
Dr. S.Vijayarani1
and Ms. Maria Sylviaa.S
1
Assistant Professor, Department of Computer Science, Bharathiar University,
Coimbatore.
2
M.Phil Research Scholar, Department of Computer Science, Bharathiar University,
Coimbatore.
ABSTRACT
Intrusion Detection System (IDS) is meant to be a software application which monitors the network or
system activities and finds if any malicious operations occur. Tremendous growth and usage of internet
raises concerns about how to protect and communicate the digital information in a safe manner.
Nowadays, hackers use different types of attacks for getting the valuable information. Many intrusion
detection techniques, methods and algorithms help to detect these attacks. This main objective of this paper
is to provide a complete study about the definition of intrusion detection, history, life cycle, types of
intrusion detection methods, types of attacks, different tools and techniques, research needs, challenges and
applications.
KEYWORDS
Intrusion detection, IDS attacks, Functionality, Life cycle, Tools, Techniques
1. INTRODUCTION
An Intrusion Detection System is an application used for monitoring the network and protecting it
from the intruder. With the rapid progress in the internet based technology new application areas
for computer network have emerged [7]. In instances, the fields like business, financial, industry,
security and healthcare sectors the LAN and WAN applications have progressed. All of these
application areas made the network an attractive target for the abuse and a big vulnerability for
the community [7]. Malicious users or hackers use the organization’s internal systems to collect
information’s and cause vulnerabilities like Software bugs, Lapse in administration, leaving
systems to default configuration [8]. As the internet emerging into the society, new stuffs like
viruses and worms are imported. The malignant so, the users use different techniques like
cracking of password, detecting unencrypted text are used to cause vulnerabilities to the system.
Hence, security is needed for the users to secure their system from the intruders. Firewall
technique is one of the popular protection techniques and it is used to protect the private network
from the public network. IDS are used in network related activities, medical applications, credit
card frauds, Insurance agency [8].
The remaining portion of the paper is organized as follows. Section 2 tells about the history and
the basic concepts of IDS. Section 3 illustrates the IDS functionality. Section 4 gives the brief
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
32
description about the life cycle of IDS. Techniques are explained in Section 5. Section 6 describes
about IDS tools. Section 7 discusses the needs and challenges. Conclusion is given in Section8.
2. HISTORY
The goal of intrusion detection is to monitor the network assets to detect anomalous behavior and
misuse in network [16]. Intrusion detection concept was introduced in early 1980’s after the
evolution of internet with surveillance end monitoring the threat [17]. There was a sudden rise in
reputation and incorporation in security infrastructure. Since then, several events in IDS
technology have advanced intrusion detection to its current state [16]. James Anderson's wrote a
paper for a government organization and imported an approach that audit trails contained
important information that could be valuable in tracking misuse and understanding of user
behavior [16].
Then the detection appeared and audit data and its importance led to terrific improvements in the
subsystems of every operating system [16]. IDS and Host Based Intrusion Detection System
(HIDS) were first defined. In 1983, SRI International and Dorothy Denning began working on a
government project that launched a new effort into intrusion detection system development [17].
Around 1990s the revenues are generated and intrusion detection market has been raised. Real
secure is an intrusion detection network developed by ISS. After a year, Cisco recognized the
priority for network intrusion detection and purchased the Wheel Group for attaining the security
solutions [17]. The government actions like Federal Intrusion Detection Networks (FID Net) were
designed under Presidential Decision Directive 63 is also adding impulse to the IDS [17].
3. INTRUSION DETECTION SYSTEM
An IDS is referred as burglar alarm. For example the lock system in the house protects the house
from theft. But if somebody breaks the lock system and tries to enter into the house, it is the
burglar alarm that detects that the lock has been broken and alerts the owner by raising an alarm.
Moreover, Firewalls do a very good job of filtering the incoming traffic from the Internet to
circumvent the firewall [8]. For example, external users can connect to the Intranet by dialing
through a modem installed in the private network of the organization; this kind of access cannot
be detected by the firewall [8].
An Intrusion Prevention System (IPS) is a network security/threat prevention technology that
audits network traffic flows to detect and prevent vulnerability exploits. There are two types of
prevention system they are Network (NIPS) and Host (HIPS). These systems watch the network
traffic and automatically take actions to protect networks and systems. IPS issue is false positives
and negatives. False positive is defined to be an event which produces an alarm in IDS where
there is no attack. False negative is defined to be an event which does not produces an alarm
when there is an attacks takes place. Inline operation can create bottlenecks such as single point
of failure, signature updates and encrypted traffic. The actions occurring in a system or network is
measured by IDS [8].
3.1 Types of IDS
Figure 1 shows the different types of Intrusion detection systems.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
33
Host based IDS
Network based IDS
Application based IDS
Figure.1. Intrusion Detection System – Types
Host based IDS views the sign of intrusion in the local system. For analysis they use host
system’s logging and other information. Host based handler is referred as sensor. Other sources,
from which a host-based sensor can obtain data, include system logs and other logs generated by
operating system processes and contents of objects not reflected in standard operating system
audit and logging mechanisms [9]. Host based system trust strongly on audit trail. The
information allows the intrusion detection system to spot subtle patterns of misuse that would not
be visible at a higher level of abstraction [10]. The elementary principle in IDS including
Network Based Intrusion Detection System (NIDS) originated from anomaly HIDS research
based on Denning’s pioneering work [11]. A host-based IDS provides much more relevant
information than Network-based IDS. HIDS are used efficiently for analyzing the network
attacks, for example, it can sometimes tell exactly what the attacker did, which commands he
used, what files he opened, rather than just a vague accusation and there is an attempt to execute a
dangerous command [12]. It is less risky to configure.
Advantages of Host based Intrusion Detection Systems:
Verifies success or failure of an attack
Monitors System Activities
Detects attacks that a network based IDS fail to detect
Near real time detection and response
Does not require additional hardware
Lower entry cost
Network based IDS systems collect information from the network itself rather than from each
separate host [13]. The NIDS audits the network attacks while packets moving across the
network. The network sensors come equipped with attack signatures that are rules on what will
constitute an attack and most network-based systems allow advanced users to define their own
signatures [13]. Attack on the sensor is based on signature and they are from the previous attacks
and the operation of the monitors will be transparent to the users and this is also significant [14].
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
34
The transparency of the monitors decreases the likelihood that an adversary will be able to locate
it and nullify its capabilities without the efforts [10]. Network Node IDS (NNIDS) agents are
deployed on every host within the network being protected [2].
Advantages of Network based Intrusion Detection Systems:
Lower Cost of Ownership
Easier to deploy
Detect network based attacks
Retaining evidence
Real Time detection and quick response.
Detection of failed attacks
Application based IDS (APIDS) will check the effective behavior and event of the protocol [2].
The system or agent is placed between a process and group of servers that monitors and analyzes
the application protocol between devices [2]. Intentional attacks are the malignant attacks carried
out by disgruntled employees to cause harm to the organization and Unintentional attacks causes
financial damage to the organization by deleting the important data file [2]. There are numerous
attacks have taken place in OSI layer
Figure 2. Intrusion Detection Attacks
3.2. Denial-of-Service (DOS) Attacks
It tries to deny the authorized users from promoting the requested service. An advanced
Distributed Denial of Service occurs in a distributed environment that the attacker sends or floods
the server with numerous connection that request to knock the target system [2].Types of DOS
attacks are
3.2.1. SYN Attack
SYN attack is also defined as Synchronization attack. Here, the attacker sends the flood of SYN
request to the destination to use the resources of the server and to make the system unresponsive.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
35
3.2.2. Ping of Death
In this the intruder sends a ping request to the targeted system which is larger than 65,536 bytes
which causes the system to crash [2]. The formal size must be 56 bytes or 84 bytes incase of
considering Internet protocol header.
3.3. Eavesdropping Attacks
It is the scheme of interference in communication by the attacker. This attack can be done over by
telephone lines or through email. [2].
3.4. Spoofing Attacks
This attacker portrays as another user to forge the data and take advantages on illegal events in
the network. IP spoofing is a common example where the system communicates with a trusted
user and provides access to the attacker [2].
3.5. Intrusion attacks or User to Root Attack (U2R)
An intruder tries to access the system or route through the network. Buffer overflow attack is a
typical intrusion attack which occurs when a web service receives more data than it has been
programmed to handle which leads to loss of data [2].
3.6. Logon Abuse Attacks
A logon abuse attack would neglect the authentication and access control mechanisms and grant a
user with more advantages [2].
3.7. Application-Level Attacks
The attacker targets the disabilities of application layer. For example, security weakness in the
web server or in faulty controls on the server side [2].
4. FUNCTIONS OF IDS
The IDS consist of four key functions namely, data collection, feature selection, analysis and
action, which is given in Figure 3.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
36
Figure 3. Functionality of IDS
4.1 Data collection
This module passes the data as input to the IDS. The data is recorded into a file and then it is
analyzed. Network based IDS collects and alters the data packets and in host based IDS collects
details like usage of the disk and processes of the system.
4.2 Feature Selection
To select the particular feature large data is available in the network and they are usually
evaluated for intrusion. For example, the Internet Protocol (IP) address of the source and target
system, protocol type, header length and size could be taken as a key for intrusion [15].
4.3 Analysis
The data is analyzed to find the correctness. Rule based IDS analyze the data where the incoming
traffic is checked against predefined signature or pattern [15]. Another method is anomaly based
IDS where the system behavior is studied and mathematical models are employed to it [15].
4.4 Action
It defines about the attack and reaction of the system. It can either inform the system
administrator with all the required data through email/alarm icons or it can play an active part in
the system by dropping packets so that it does not enter the system or close the ports [15].
5. IDS LIFE CYCLE
Vendors frequently release new IDS products aggressively and compete for market shares [19].
Estimating the new systems is not a relevant task and product calculation information is
imperfect. Hiring and retaining the workers to administer security and intrusion detection are the
challenging tasks [19]. Faster changes in IT make it problematic for the firm to implement long-
term security strategy.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
37
Figure 4. Functionality of IDS
5.1 Evaluation and Selection
If an organization plans to get IDS it should examine the resources available for the systems
operation and maintenance [19]. Lifecycle of a product for economic IDS is accelerated. The
third-party evaluation is available and their reports are generally on the surface [19]. This process
illustrates about the finding of the intruder and the amount of work required for maintaining the
system in the network with traffic and the selection process defines about the identification of
character, approaches, accuracy, usability, and effectiveness.
5.2 Deployment
Deployment phase includes the working of sensors to maximize protection for the critical assets
by configuring the IDS to reflect security policy and installing signatures [19]. Users must
develop rules for handling the alerts and to associate alerts with other systems. The Intrusion
Detection Working Group of the Internet Engineering Task Force (IETF) is developing common
alert format that uses the IDS to alert from different systems and they are reported to a common
display console [19].
5.3 Operation and use
Organization administers the IDS to monitor the host and to respond the report as an alert. It
establishes the roles and responsibilities for analyzing and monitoring the outcomes of both
manual and automatic responses [19]. Smart intruders who realize that IDS has been deployed on
a network attack that they force it to provide false report [19].
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
38
5.4 Maintenance
Maintenance includes installation of signatures and IDS upgrades. Sensor placement should be
revisited periodically to ensure that system or network changes [19]. An organization must
attract, train and retain qualified technical staff to operate and maintain IDS technologies [19].
6. IDS TECHNIQUES
6.1 ANOMALY BASED INTRUSION DETECTION
Anomaly is indicated as an outlier, peculiarities or exceptions are the data pattern which performs
abnormally. Anomaly detection technique is designed to uncover the patterns that are far from the
normal and others are flagged as an intrusion [2]. Anomaly detections are categorized into static
and dynamic detectors.
Static anomaly detector is assumed as a portion of monitored system which remains constant. The
static portion is possessed into two parts, i.e. system code and system data. Static portions of the
system can be represented as a binary bit. If any divergence from its original form is occurred
then the error has been indicated or the burglar has reshaped the portion of the system.
In dynamic detector the definition of the system behavior is included. The system behavior is
defined as an order of different event. For example, audit records produced by the operating
system are used by IDS to define the events of interest [2]. In this case, the behavior can be
observed only when audit records are created by OS and the events are occurred in strict
sequences [2]. If uncertain behavior is considered as anomalous, then the system administrators
may be alerted by false alarms [3].
Anomaly detection is useful for finding attacks like misuse of protocol and service ports, DoS
based on crafted payloads, DoS based on volume (DDoS), buffer overflow and other application
payload anomaly.
Techniques used in anomaly detection:
There are number of event and event counter are refined and have been implemented in anomaly
detection.
Statistical Models
The statistical model shows the output as a statistical value. There are two types of statistical
models, they are
a) Operational Model (or) Threshold Metric: The actions that occur over a period of
time regulate the alarm. This can be visualized in Win2k lock; a user after n unsuccessful
login attempts regulates the alarm. Here lower limit is 0 and upper limit is n [15].
b) Markov Process or Marker Model: In this model the system is inspected at fixed time
intermission. The behavior is detected as anomaly if the probability of the state is low
[15].
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
39
Cognition Models
a) Finite State Machine: A finite state machine (FSM) or finite automation is a model of
behavior captured in states, transitions and actions [15]. A state defines about the past
information. An action is a description of an activity that is to be performed at a given
moment and the types of action are entry action, exit action and transition action [15].
b) Description Scripts: Scripting languages characterize the attacks on computers and
networks. All scripting languages are capable of examining the sequences of specific
events [15].
Cognition Based Detection Techniques
Cognition-Based (also called knowledge-based or expert systems) Detection Techniques work on
the audit data [15].The set of predefined rules for the classes and attributes are identified from
training dataset [15].
a) Boosted Decision Tree or Boosted Tree (BT): It uses ADA Boost (adaptive
boosting) algorithm to generate many Decision Trees classifiers trained by different
sample which is implemented in IDS [15].
b) Support Vector Machine (SVM): SVM is defined to be the classifiers which are
designed for the binary classification. Decision tree based SVM is a techniques which
merges the two techniques to solve the problem in an efficient way. The training and
testing time can be decreased by using this method.
6.2 SIGNATURE BASED INTRUSION DETECTION
Signature based intrusion detection is termed as misuse detection. Here, the dataset has number of
instances and every data must be labeled as normal or intrusive. The machine learning algorithms
are used to train the data set according to their label. This technique automatically retains the
signature to detect the intruder. Misuse detection technique is created automatically and the works
are more complicated and accurate than manually done [4]. Depending on the robustness and
seriousness of a signature that is activated within the system, some alarm response or notification
should be sent to the right authorities [4].
Techniques used in misuse detection:
a) Expression matching: Expression matching is the easiest and simplest form in misuse
detection. In this it searches for the stream of events like log entries for the happening of
exact pattern.
b) State transition analysis: This model attacks the state or the transitions in the network.
Every event in the network is applied to finite state machine instances which finally
results in transition. An attack will be occurred when the machine reaches its final state.
6.3 TARGET MONITORING
Target monitoring is a technique which is used to report if any changes or modifications happen
in the system. This is usually done through cryptographic algorithm which computes a crypto
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
40
checksum for each targeted file [5].If any changes happens in crypto checksum they are reported
by IDS. Tripwire checksum is an integrity checker which checks for the changes or modification
in the files.
6.4 STEALTH PROBES
A stealth probe is a technique used to collect and associates the data. It tries to find the attacks
which has taken long period of time. Attackers will check for the system errors over a period of
month, and wait for another two months to launch the attacks and they take a wide-area sampling
and attempt to discover any correlating attacks [2].
7. TOOLS IN INTRUSION DETECTION
An intrusion detection product available today addresses a range of organizational security goals
[2].This section discusses about the security tools.
7.1 SNORT
Snort is lightweight and open source software. Snort uses a flexible rule-based language to
describe the traffic [6].From an IP address; it records the packet in human readable form. Through
protocol analysis, content searching, and various pre-processors Snort detects thousands of
worms, vulnerability exploit attempts, port scans, and other suspicious behavior [6].
7.2 OSSEC-HIDS
OSSEC (open source security) is free open source software. It will run on major operating system
and uses a Client/Server based architecture. OSSEC has the ability to send OS logs to the server
for analysis and storage. It is used in powerful log analysis engine, ISPs, universities and data
centres. Authentication logs, firewalls are monitored and analysed by HIDS.
7.3 FRAGROUTE
It is termed as fragmenting router. Here, from the attacker to the fragrouter the IP packet is sent
and they are then fragmented and transformed to the party.
7.4 HONEYD
Honeyd is a tool that creates virtual hosts on the network [6]. The services are used by the host
Honeyd allows a single host to request multiple addresses on a LAN for networks simulation. It is
possible to knock the virtual machines or to trace route them [6]. Any type of service on the
virtual machine can be simulated according to a simple configuration file [6].
7.5 KISMET
It is a guideline for WIDS (Wireless intrusion detection system).WIDS compromises with packet
payload and happenings of WIDS. It will find the burglar access point.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
41
8. NEEDS AND CHALLENGES
For implementing an IPS device there are numerous challenges. The IPS device is designed to
work inline presenting a potential choke point and single point of failure [18]. Some pursued
attacks are undetected if the passive IDS fails and the network performances are impacted when
the inline device fails. [18]. One of the components of network, the NIPS (Network intrusion
prevention system) device must perform like a network switch. It must meet the network
performance and reliability requirements to organise the challenges. Hence, very few customers
are willing to sacrifice the network performance and reliability for security purposes [18].
A NIPS slows down the traffic and the issue of NIPS is dropped packets, they are used to
accomplish data stream. Most high-end IPS vendors will get this problem by using custom
hardware with advanced FPGAs and ASICs [18]. It is necessary to design the product to operate
as an intrusion detection and prevention device [18]. Every organization needs IDS which is like
a defence tool. There are some challenges the organizations face while deploying an intrusion
detection system [8].
1. IDS technology itself is undergoing a lot of enhancements. From the IDS implementation it is
understood that it is important for an organisation. IDS technology does not need human
interventions. Today an IDS technology offers some automation like notifying the administrator
in case of detection of a malicious activity, shunning the malicious connection for a configurable
period of time, dynamically modifying a router's access control list in order to stop a malicious
connection [8]. For every event occurrence the IDS logs should be monitored. Monitoring the
logs on a daily basis is required to analyze the activities which are detected by the IDS over a
period of time [8].
2. IDS implementation depends on the deployment success. Planning is important for the design
and implementation phase. In most cases, it is desirable to implement a hybrid solution of
network based and host based IDS [8]. The decision can vary between organizations. A network
based IDS is an immediate choice for many organizations because of its ability to monitor
multiple systems and also the fact that it does not require a software to be loaded on a production
system unlike host based IDS [8].
Some of the organizations provide hybrid solution. So, the available resources are needed for a
system before installing a host based sensor [8].
3. The ratio of sensor manager should be acclaimed. It is very important to design the baseline
policy before starting the IDS implementation and avoid false positives result. IDS sensor may
send a lot of false positives result to the sensor and the ratio can be inadequate [8].
4. The IDS technology is still reactive rather than proactive and this technology works on attack
signatures [8]. Signatures are defined as a pattern of attacks which is defined earlier. The
signature database needs to be updated whenever a different kind of attack is detected and they
are fixed in the database and the frequency of signature update varies from vendor to vendor [8].
5. Because of collision domains in switched network the traffic in and out port cannot be seen
from any other host port. But in HUB based network in and out can be viewed from any of the
port. NIDS sensor needs to detect traffic in and out of a port and for the malicious traffic in the
switched environment. For achieving this kind they use port mirroring or spanning [8].
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
42
9. IDS IN VARIOUS DOMAINS
An IDS is used in numerous fields and the performance in each field is described and defines how
they performed.
9.1 IDS in MANET
Manet is defined as mobile adhoc network. It is an autonomous network that is composed
naturally by the combinations of mobile nodes without centralized administration.IDS is used in
Manet. Mobile network is normally needed in the battlefield for military people to get proper
network [20]. Normally the messages are splited into number of packet and they use a hardware
device like wire and modem to transmit. But, in Manet they are connected wirelessly. Watchdog
and path rater are the two techniques added on the protocol in Adhoc.
A watchdog identifies the misbehaving nodes by eavesdropping on the transmission of the next
hop [20]. A path rater then helps to find the routes that do not contain those nodes [20]. IDS are
used in Manet while transferring the series of packets to the destination through mobile network
to find the intruder if any.
9.2 IDS FOR CLOUD COMPUTING
Cloud computing is illustrated as internet based computing cloud where, virtual shared servers
provide software infrastructure platform devices and other resources and hosting to customer as a
service on pay-as you-use basis [21]. The user of the cloud does not hold any physical framework
instead they lease from the mediator (third party). They pay only for the usage of the resource.
Intrusion detection system plays an important role in the security and perseverance of active
defense system against intruder hostile attacks for any business and IT organization [24]. In cloud
computing the applications are received on the remote server of the provider and they have the
control towards the usage of the data. IDMEF (Intrusion detection message exchange format) is
the standard used in cloud for the communication purpose [21].
Cloud computing security issues
Cloud data confidentiality
Attacks on remote server
Cloud security auditing
Lack of data interoperability
9.3 IDS IN DATA MINING
Data mining is the process of extracting the hidden knowledge from the databases. IDS are very
important in data mining. Intrusion detection includes identifying a set of malicious actions that
compromise the integrity and availability of information resources [22].
Intrusion detection in data mining has two divisions, they are, misuse detection and anomaly
detection. In misuse detection the labeled data are built using anticipating model [23]. In anomaly
detection there is a deviation between models. To use the data first it should be converted into
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
43
featured data and the data mining models are applied to it and they are summarized to produce the
result.
TECHNICAL CHALLENGES
Large data size
Higher dimensionality
Data preprocessing
10. CONCLUSION
The main objective of this paper is to provide an overview of the necessity and utility of intrusion
detection system. This paper gives complete study about types of IDS, life cycle, various
domains, types of attacks and tools. IDS are becoming essential for day today security in
corporate world and for network users. IPS defines about the preventing measures for the
security. In the lifecycle the phases developed and the stages are illustrated. Still, there are more
challenges to overcome. The techniques of anomaly detection and misuse detection are
specifically illustrated and more techniques can be used. Further Work will be done on
comparative analysis of some popular data mining algorithms applied to IDS and enhancing a
classification based IDS using selective feedback methods.
REFERENCES:
[1] Corinne Lawrence- “IPS – The Future of Intrusion Detection”- University of Auckland - 26th
October 2004.
[2] Karthikeyan .K.R and A. Indra- “Intrusion Detection Tools and Techniques a Survey”
[3] Anita K. Jones and Robert S. Sielken –“Computer System Intrusion Detection A Survey
“International Journal of Computer Theory and Engineering, Vol.2, No.6, December, 2010
[4] Vera Marinova-Boncheva-“A Short Survey of Intrusion Detection Systems”-. Bulgarian academy of
sciences.
[5] Carl Endorf, Eugene Schultz, Jim Mellander “Intrusion detection & prevention” by Written-published
by McGraw-Hill.
[6] “Top 125 Network Security Tools”- SecTools.Org- http://sectools.org/tag/ids/sec
[7] PeymanKabiri and Ali A.Ghorbani-“Research on Intrusion Detection and Response Survey”-
International Journal of Network Security, Vol.1, No.2, PP.84–102, Sep. 2005
[8] Christopher Low –“Understanding Wireless attacks &detection “-GIAC Security Essentials
Certification (GSEC) Practical Assignment 13 April 2005 -SANS Institute InfoSec Reading Room.
[9] Bace, Rebecca-“An Introduction to Intrusion Detection &Assessment”- Infidel, Inc. for ICSA, Inc.
[10] Rebecca Gurley Bace-“Intrusion Detection”- Macmillan Technical Publishing, 2000.
[11] Denning, Dorothy E. – “An Intrusion Detection Model”- Proceedings of the Seventh IEEE
Symposium on Security and Privacy May 1986
[12] Intrusion detection system buyer’s guide
[13] “Global Information Assurance Certification Paper”- Copyright SANS Institute Copyright SANS
Institute Author Retains Full Rights
[14] “SANS penetration testing copyright by SANS”-Copyright SANS Institute Author Retains Full
Rights.
[15] Sriram Sundar Rajan, Vijaya Krishna Cherukuri-“An Overview of Intrusion Detection Systems”.
[16] Asmaa Shaker Ashoor, Prof. Sharad Gore – “Importance of Intrusion Detection System”-International
Journal of Scientific & Engineering Research, Volume 2, Issue 1, January-2011.
[17] Paul Innella- “The Evolution of Intrusion Detection Systems“-Tetrad Digital Integrity, LLC.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015
44
[18] “Intrusion Detection and Intrusion Prevention”-Ed Sale VP of Security Pivot Group, LLC.
[19] John McHugh, Alan Christie, and Julia Allen- “The Role of Intrusion Detection Systems”- Software
Engineering Institute, CERT Coordination Center.
[20] Shankar Sharan Tripathi, Sonu Agrawal- “A Survey on Enhanced Intrusion Detection System in
Mobile Ad hoc Network”-International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET) Volume 1, Issue 7, September 2012.
[21] Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande – “Intrusion Detection System for
Cloud Computing”. International Journal of Scientific & Technology Research Volume 1, Issue 4,
May 2012 ISSN 2277-8616 67 IJSTR©2012.
[22] Paul Dokas, Levent Ertoz, Vipin Kumar, Aleksandar Lazarevic, Jaideep Srivastava, Pang-Ning Tan-
“Data Mining for Network Intrusion Detection”.
[23] Aleksandar Lazarević,Jaideep Srivastava, Vipin Kumar-“Data Mining for intrusion detection”-
Tutorial on the Pacific-Asia Conference on Knowledge Discovery in Databases 2003.
[24] Ms Asiya Jaleel -“Security Challenge in Cloud Computing”- Provided by International Journal of
Engineering Sciences & Research Technology (IJESRT), Feb 2014
AUTHORS
BIOGRAPHY
Dr. S. Vijayarani has completed MCA, M.Phil and Ph.D in Computer Science. She is
working as Assistant Professor in the School of Computer Science and Engineering,
Bharathiar University, Coimbatore. Her fields of research interest are data mining, privacy
and security issues in data mining and data streams. She has published papers in the
international journals and presented research papers in international and national
conferences.
Ms. Maria Sylviaa.S has completed Master of Com puter.Applications. She is currently
pursuing her M.Phil in Computer Science in the School of Computer Science and
Engineering, Bharathiar University, Coimbatore. Her fields of interest are Data Mining
and Network Security.

More Related Content

PDF
A STUDY ON INTRUSION DETECTION
PDF
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
PDF
A Collaborative Intrusion Detection System for Cloud Computing
PDF
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
DOC
Intrusion detection and anomaly detection system using sequential pattern mining
PDF
Comparative Study on Intrusion Detection Systems for Smartphones
PDF
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
PDF
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
A STUDY ON INTRUSION DETECTION
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
A Collaborative Intrusion Detection System for Cloud Computing
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
Intrusion detection and anomaly detection system using sequential pattern mining
Comparative Study on Intrusion Detection Systems for Smartphones
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...

What's hot (18)

PDF
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
PDF
Security Solutions against Computer Networks Threats
PDF
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
DOC
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
PDF
50320130403001 2-3
PDF
Isaca june 19, 2010
DOCX
INFORMATION SECURITY MANAGEMENT
 
PDF
Intelligent Network Surveillance Technology for APT Attack Detections
PPTX
Risks and Security of Internet and System
PDF
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
PDF
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
DOC
06686259 20140405 205404
PDF
Towards the security issues in Mobile Ad Hoc Networks
PDF
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
PDF
Bt33430435
PDF
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
PDF
Cyber Security
PDF
A comprehensive study on classification of passive intrusion and extrusion de...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Security Solutions against Computer Networks Threats
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
50320130403001 2-3
Isaca june 19, 2010
INFORMATION SECURITY MANAGEMENT
 
Intelligent Network Surveillance Technology for APT Attack Detections
Risks and Security of Internet and System
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
06686259 20140405 205404
Towards the security issues in Mobile Ad Hoc Networks
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Bt33430435
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Cyber Security
A comprehensive study on classification of passive intrusion and extrusion de...
Ad

Viewers also liked (20)

PDF
A Survey of Various Intrusion Detection Systems
PDF
Survey on Host and Network Based Intrusion Detection System
PDF
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
PDF
OTC Data Mining Anomaly Detection Methods
PPT
Intrusion Detection
PPT
Intrusion Detection Presentation
PDF
A survey of Network Intrusion Detection using soft computing Technique
PPTX
Analysis and Design for Intrusion Detection System Based on Data Mining
PPTX
Databse Intrusion Detection Using Data Mining Approach
PDF
Enhanced method for intrusion detection over kdd cup 99 dataset
PDF
An Intrusion Detection based on Data mining technique and its intended import...
PPTX
Network security using data mining concepts
PPTX
Intrusion detection systems in wireless sensor networks
PPTX
Network intrusion detection system and analysis
PPT
Data Mining and Intrusion Detection
PPSX
Adaptive Intrusion Detection Using Learning Classifiers
PPTX
Intrusion detection using data mining
PPT
Data Mining: Concepts and techniques: Chapter 13 trend
PPT
data mining for security application
PPTX
data mining privacy concerns ppt presentation
A Survey of Various Intrusion Detection Systems
Survey on Host and Network Based Intrusion Detection System
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
OTC Data Mining Anomaly Detection Methods
Intrusion Detection
Intrusion Detection Presentation
A survey of Network Intrusion Detection using soft computing Technique
Analysis and Design for Intrusion Detection System Based on Data Mining
Databse Intrusion Detection Using Data Mining Approach
Enhanced method for intrusion detection over kdd cup 99 dataset
An Intrusion Detection based on Data mining technique and its intended import...
Network security using data mining concepts
Intrusion detection systems in wireless sensor networks
Network intrusion detection system and analysis
Data Mining and Intrusion Detection
Adaptive Intrusion Detection Using Learning Classifiers
Intrusion detection using data mining
Data Mining: Concepts and techniques: Chapter 13 trend
data mining for security application
data mining privacy concerns ppt presentation
Ad

Similar to Intrusion detection system – a study (20)

PDF
A STUDY ON INTRUSION DETECTION
PDF
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
PDF
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
PDF
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
PDF
A Review Of Intrusion Detection System In Computer Network
PDF
The Role of Intrusion Detection Systems in Network Security.pdf
PDF
The Role of Intrusion Detection Systems in Network Security.pdf
PDF
An Extensive Survey of Intrusion Detection Systems
PDF
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
PDF
Intrusion Detection System using AI and Machine Learning Algorithm
PDF
Exploring the Insights of Intrusion Detection Systems in Cybercrime.pdf
PPT
idps
PDF
Detection &Amp; Prevention Systems
PDF
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
PDF
1776 1779
PDF
1776 1779
PDF
IRJET- A Review on Intrusion Detection System
PDF
A REVIEW ON INTRUSION DETECTION SYSTEM
A STUDY ON INTRUSION DETECTION
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
International Journal of Engineering Research and Development (IJERD)
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
A Review Of Intrusion Detection System In Computer Network
The Role of Intrusion Detection Systems in Network Security.pdf
The Role of Intrusion Detection Systems in Network Security.pdf
An Extensive Survey of Intrusion Detection Systems
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Intrusion Detection System using AI and Machine Learning Algorithm
Exploring the Insights of Intrusion Detection Systems in Cybercrime.pdf
idps
Detection &Amp; Prevention Systems
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
1776 1779
1776 1779
IRJET- A Review on Intrusion Detection System
A REVIEW ON INTRUSION DETECTION SYSTEM

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Electronic commerce courselecture one. Pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Dropbox Q2 2025 Financial Results & Investor Presentation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Unlocking AI with Model Context Protocol (MCP)
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
NewMind AI Weekly Chronicles - August'25 Week I
The AUB Centre for AI in Media Proposal.docx
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
MYSQL Presentation for SQL database connectivity
Electronic commerce courselecture one. Pdf
Network Security Unit 5.pdf for BCA BBA.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
sap open course for s4hana steps from ECC to s4
Programs and apps: productivity, graphics, security and other tools
MIND Revenue Release Quarter 2 2025 Press Release
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Understanding_Digital_Forensics_Presentation.pptx

Intrusion detection system – a study

  • 1. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 DOI : 10.5121/ijsptm.2015.4104 31 INTRUSION DETECTION SYSTEM – A STUDY Dr. S.Vijayarani1 and Ms. Maria Sylviaa.S 1 Assistant Professor, Department of Computer Science, Bharathiar University, Coimbatore. 2 M.Phil Research Scholar, Department of Computer Science, Bharathiar University, Coimbatore. ABSTRACT Intrusion Detection System (IDS) is meant to be a software application which monitors the network or system activities and finds if any malicious operations occur. Tremendous growth and usage of internet raises concerns about how to protect and communicate the digital information in a safe manner. Nowadays, hackers use different types of attacks for getting the valuable information. Many intrusion detection techniques, methods and algorithms help to detect these attacks. This main objective of this paper is to provide a complete study about the definition of intrusion detection, history, life cycle, types of intrusion detection methods, types of attacks, different tools and techniques, research needs, challenges and applications. KEYWORDS Intrusion detection, IDS attacks, Functionality, Life cycle, Tools, Techniques 1. INTRODUCTION An Intrusion Detection System is an application used for monitoring the network and protecting it from the intruder. With the rapid progress in the internet based technology new application areas for computer network have emerged [7]. In instances, the fields like business, financial, industry, security and healthcare sectors the LAN and WAN applications have progressed. All of these application areas made the network an attractive target for the abuse and a big vulnerability for the community [7]. Malicious users or hackers use the organization’s internal systems to collect information’s and cause vulnerabilities like Software bugs, Lapse in administration, leaving systems to default configuration [8]. As the internet emerging into the society, new stuffs like viruses and worms are imported. The malignant so, the users use different techniques like cracking of password, detecting unencrypted text are used to cause vulnerabilities to the system. Hence, security is needed for the users to secure their system from the intruders. Firewall technique is one of the popular protection techniques and it is used to protect the private network from the public network. IDS are used in network related activities, medical applications, credit card frauds, Insurance agency [8]. The remaining portion of the paper is organized as follows. Section 2 tells about the history and the basic concepts of IDS. Section 3 illustrates the IDS functionality. Section 4 gives the brief
  • 2. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 32 description about the life cycle of IDS. Techniques are explained in Section 5. Section 6 describes about IDS tools. Section 7 discusses the needs and challenges. Conclusion is given in Section8. 2. HISTORY The goal of intrusion detection is to monitor the network assets to detect anomalous behavior and misuse in network [16]. Intrusion detection concept was introduced in early 1980’s after the evolution of internet with surveillance end monitoring the threat [17]. There was a sudden rise in reputation and incorporation in security infrastructure. Since then, several events in IDS technology have advanced intrusion detection to its current state [16]. James Anderson's wrote a paper for a government organization and imported an approach that audit trails contained important information that could be valuable in tracking misuse and understanding of user behavior [16]. Then the detection appeared and audit data and its importance led to terrific improvements in the subsystems of every operating system [16]. IDS and Host Based Intrusion Detection System (HIDS) were first defined. In 1983, SRI International and Dorothy Denning began working on a government project that launched a new effort into intrusion detection system development [17]. Around 1990s the revenues are generated and intrusion detection market has been raised. Real secure is an intrusion detection network developed by ISS. After a year, Cisco recognized the priority for network intrusion detection and purchased the Wheel Group for attaining the security solutions [17]. The government actions like Federal Intrusion Detection Networks (FID Net) were designed under Presidential Decision Directive 63 is also adding impulse to the IDS [17]. 3. INTRUSION DETECTION SYSTEM An IDS is referred as burglar alarm. For example the lock system in the house protects the house from theft. But if somebody breaks the lock system and tries to enter into the house, it is the burglar alarm that detects that the lock has been broken and alerts the owner by raising an alarm. Moreover, Firewalls do a very good job of filtering the incoming traffic from the Internet to circumvent the firewall [8]. For example, external users can connect to the Intranet by dialing through a modem installed in the private network of the organization; this kind of access cannot be detected by the firewall [8]. An Intrusion Prevention System (IPS) is a network security/threat prevention technology that audits network traffic flows to detect and prevent vulnerability exploits. There are two types of prevention system they are Network (NIPS) and Host (HIPS). These systems watch the network traffic and automatically take actions to protect networks and systems. IPS issue is false positives and negatives. False positive is defined to be an event which produces an alarm in IDS where there is no attack. False negative is defined to be an event which does not produces an alarm when there is an attacks takes place. Inline operation can create bottlenecks such as single point of failure, signature updates and encrypted traffic. The actions occurring in a system or network is measured by IDS [8]. 3.1 Types of IDS Figure 1 shows the different types of Intrusion detection systems.
  • 3. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 33 Host based IDS Network based IDS Application based IDS Figure.1. Intrusion Detection System – Types Host based IDS views the sign of intrusion in the local system. For analysis they use host system’s logging and other information. Host based handler is referred as sensor. Other sources, from which a host-based sensor can obtain data, include system logs and other logs generated by operating system processes and contents of objects not reflected in standard operating system audit and logging mechanisms [9]. Host based system trust strongly on audit trail. The information allows the intrusion detection system to spot subtle patterns of misuse that would not be visible at a higher level of abstraction [10]. The elementary principle in IDS including Network Based Intrusion Detection System (NIDS) originated from anomaly HIDS research based on Denning’s pioneering work [11]. A host-based IDS provides much more relevant information than Network-based IDS. HIDS are used efficiently for analyzing the network attacks, for example, it can sometimes tell exactly what the attacker did, which commands he used, what files he opened, rather than just a vague accusation and there is an attempt to execute a dangerous command [12]. It is less risky to configure. Advantages of Host based Intrusion Detection Systems: Verifies success or failure of an attack Monitors System Activities Detects attacks that a network based IDS fail to detect Near real time detection and response Does not require additional hardware Lower entry cost Network based IDS systems collect information from the network itself rather than from each separate host [13]. The NIDS audits the network attacks while packets moving across the network. The network sensors come equipped with attack signatures that are rules on what will constitute an attack and most network-based systems allow advanced users to define their own signatures [13]. Attack on the sensor is based on signature and they are from the previous attacks and the operation of the monitors will be transparent to the users and this is also significant [14].
  • 4. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 34 The transparency of the monitors decreases the likelihood that an adversary will be able to locate it and nullify its capabilities without the efforts [10]. Network Node IDS (NNIDS) agents are deployed on every host within the network being protected [2]. Advantages of Network based Intrusion Detection Systems: Lower Cost of Ownership Easier to deploy Detect network based attacks Retaining evidence Real Time detection and quick response. Detection of failed attacks Application based IDS (APIDS) will check the effective behavior and event of the protocol [2]. The system or agent is placed between a process and group of servers that monitors and analyzes the application protocol between devices [2]. Intentional attacks are the malignant attacks carried out by disgruntled employees to cause harm to the organization and Unintentional attacks causes financial damage to the organization by deleting the important data file [2]. There are numerous attacks have taken place in OSI layer Figure 2. Intrusion Detection Attacks 3.2. Denial-of-Service (DOS) Attacks It tries to deny the authorized users from promoting the requested service. An advanced Distributed Denial of Service occurs in a distributed environment that the attacker sends or floods the server with numerous connection that request to knock the target system [2].Types of DOS attacks are 3.2.1. SYN Attack SYN attack is also defined as Synchronization attack. Here, the attacker sends the flood of SYN request to the destination to use the resources of the server and to make the system unresponsive.
  • 5. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 35 3.2.2. Ping of Death In this the intruder sends a ping request to the targeted system which is larger than 65,536 bytes which causes the system to crash [2]. The formal size must be 56 bytes or 84 bytes incase of considering Internet protocol header. 3.3. Eavesdropping Attacks It is the scheme of interference in communication by the attacker. This attack can be done over by telephone lines or through email. [2]. 3.4. Spoofing Attacks This attacker portrays as another user to forge the data and take advantages on illegal events in the network. IP spoofing is a common example where the system communicates with a trusted user and provides access to the attacker [2]. 3.5. Intrusion attacks or User to Root Attack (U2R) An intruder tries to access the system or route through the network. Buffer overflow attack is a typical intrusion attack which occurs when a web service receives more data than it has been programmed to handle which leads to loss of data [2]. 3.6. Logon Abuse Attacks A logon abuse attack would neglect the authentication and access control mechanisms and grant a user with more advantages [2]. 3.7. Application-Level Attacks The attacker targets the disabilities of application layer. For example, security weakness in the web server or in faulty controls on the server side [2]. 4. FUNCTIONS OF IDS The IDS consist of four key functions namely, data collection, feature selection, analysis and action, which is given in Figure 3.
  • 6. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 36 Figure 3. Functionality of IDS 4.1 Data collection This module passes the data as input to the IDS. The data is recorded into a file and then it is analyzed. Network based IDS collects and alters the data packets and in host based IDS collects details like usage of the disk and processes of the system. 4.2 Feature Selection To select the particular feature large data is available in the network and they are usually evaluated for intrusion. For example, the Internet Protocol (IP) address of the source and target system, protocol type, header length and size could be taken as a key for intrusion [15]. 4.3 Analysis The data is analyzed to find the correctness. Rule based IDS analyze the data where the incoming traffic is checked against predefined signature or pattern [15]. Another method is anomaly based IDS where the system behavior is studied and mathematical models are employed to it [15]. 4.4 Action It defines about the attack and reaction of the system. It can either inform the system administrator with all the required data through email/alarm icons or it can play an active part in the system by dropping packets so that it does not enter the system or close the ports [15]. 5. IDS LIFE CYCLE Vendors frequently release new IDS products aggressively and compete for market shares [19]. Estimating the new systems is not a relevant task and product calculation information is imperfect. Hiring and retaining the workers to administer security and intrusion detection are the challenging tasks [19]. Faster changes in IT make it problematic for the firm to implement long- term security strategy.
  • 7. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 37 Figure 4. Functionality of IDS 5.1 Evaluation and Selection If an organization plans to get IDS it should examine the resources available for the systems operation and maintenance [19]. Lifecycle of a product for economic IDS is accelerated. The third-party evaluation is available and their reports are generally on the surface [19]. This process illustrates about the finding of the intruder and the amount of work required for maintaining the system in the network with traffic and the selection process defines about the identification of character, approaches, accuracy, usability, and effectiveness. 5.2 Deployment Deployment phase includes the working of sensors to maximize protection for the critical assets by configuring the IDS to reflect security policy and installing signatures [19]. Users must develop rules for handling the alerts and to associate alerts with other systems. The Intrusion Detection Working Group of the Internet Engineering Task Force (IETF) is developing common alert format that uses the IDS to alert from different systems and they are reported to a common display console [19]. 5.3 Operation and use Organization administers the IDS to monitor the host and to respond the report as an alert. It establishes the roles and responsibilities for analyzing and monitoring the outcomes of both manual and automatic responses [19]. Smart intruders who realize that IDS has been deployed on a network attack that they force it to provide false report [19].
  • 8. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 38 5.4 Maintenance Maintenance includes installation of signatures and IDS upgrades. Sensor placement should be revisited periodically to ensure that system or network changes [19]. An organization must attract, train and retain qualified technical staff to operate and maintain IDS technologies [19]. 6. IDS TECHNIQUES 6.1 ANOMALY BASED INTRUSION DETECTION Anomaly is indicated as an outlier, peculiarities or exceptions are the data pattern which performs abnormally. Anomaly detection technique is designed to uncover the patterns that are far from the normal and others are flagged as an intrusion [2]. Anomaly detections are categorized into static and dynamic detectors. Static anomaly detector is assumed as a portion of monitored system which remains constant. The static portion is possessed into two parts, i.e. system code and system data. Static portions of the system can be represented as a binary bit. If any divergence from its original form is occurred then the error has been indicated or the burglar has reshaped the portion of the system. In dynamic detector the definition of the system behavior is included. The system behavior is defined as an order of different event. For example, audit records produced by the operating system are used by IDS to define the events of interest [2]. In this case, the behavior can be observed only when audit records are created by OS and the events are occurred in strict sequences [2]. If uncertain behavior is considered as anomalous, then the system administrators may be alerted by false alarms [3]. Anomaly detection is useful for finding attacks like misuse of protocol and service ports, DoS based on crafted payloads, DoS based on volume (DDoS), buffer overflow and other application payload anomaly. Techniques used in anomaly detection: There are number of event and event counter are refined and have been implemented in anomaly detection. Statistical Models The statistical model shows the output as a statistical value. There are two types of statistical models, they are a) Operational Model (or) Threshold Metric: The actions that occur over a period of time regulate the alarm. This can be visualized in Win2k lock; a user after n unsuccessful login attempts regulates the alarm. Here lower limit is 0 and upper limit is n [15]. b) Markov Process or Marker Model: In this model the system is inspected at fixed time intermission. The behavior is detected as anomaly if the probability of the state is low [15].
  • 9. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 39 Cognition Models a) Finite State Machine: A finite state machine (FSM) or finite automation is a model of behavior captured in states, transitions and actions [15]. A state defines about the past information. An action is a description of an activity that is to be performed at a given moment and the types of action are entry action, exit action and transition action [15]. b) Description Scripts: Scripting languages characterize the attacks on computers and networks. All scripting languages are capable of examining the sequences of specific events [15]. Cognition Based Detection Techniques Cognition-Based (also called knowledge-based or expert systems) Detection Techniques work on the audit data [15].The set of predefined rules for the classes and attributes are identified from training dataset [15]. a) Boosted Decision Tree or Boosted Tree (BT): It uses ADA Boost (adaptive boosting) algorithm to generate many Decision Trees classifiers trained by different sample which is implemented in IDS [15]. b) Support Vector Machine (SVM): SVM is defined to be the classifiers which are designed for the binary classification. Decision tree based SVM is a techniques which merges the two techniques to solve the problem in an efficient way. The training and testing time can be decreased by using this method. 6.2 SIGNATURE BASED INTRUSION DETECTION Signature based intrusion detection is termed as misuse detection. Here, the dataset has number of instances and every data must be labeled as normal or intrusive. The machine learning algorithms are used to train the data set according to their label. This technique automatically retains the signature to detect the intruder. Misuse detection technique is created automatically and the works are more complicated and accurate than manually done [4]. Depending on the robustness and seriousness of a signature that is activated within the system, some alarm response or notification should be sent to the right authorities [4]. Techniques used in misuse detection: a) Expression matching: Expression matching is the easiest and simplest form in misuse detection. In this it searches for the stream of events like log entries for the happening of exact pattern. b) State transition analysis: This model attacks the state or the transitions in the network. Every event in the network is applied to finite state machine instances which finally results in transition. An attack will be occurred when the machine reaches its final state. 6.3 TARGET MONITORING Target monitoring is a technique which is used to report if any changes or modifications happen in the system. This is usually done through cryptographic algorithm which computes a crypto
  • 10. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 40 checksum for each targeted file [5].If any changes happens in crypto checksum they are reported by IDS. Tripwire checksum is an integrity checker which checks for the changes or modification in the files. 6.4 STEALTH PROBES A stealth probe is a technique used to collect and associates the data. It tries to find the attacks which has taken long period of time. Attackers will check for the system errors over a period of month, and wait for another two months to launch the attacks and they take a wide-area sampling and attempt to discover any correlating attacks [2]. 7. TOOLS IN INTRUSION DETECTION An intrusion detection product available today addresses a range of organizational security goals [2].This section discusses about the security tools. 7.1 SNORT Snort is lightweight and open source software. Snort uses a flexible rule-based language to describe the traffic [6].From an IP address; it records the packet in human readable form. Through protocol analysis, content searching, and various pre-processors Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior [6]. 7.2 OSSEC-HIDS OSSEC (open source security) is free open source software. It will run on major operating system and uses a Client/Server based architecture. OSSEC has the ability to send OS logs to the server for analysis and storage. It is used in powerful log analysis engine, ISPs, universities and data centres. Authentication logs, firewalls are monitored and analysed by HIDS. 7.3 FRAGROUTE It is termed as fragmenting router. Here, from the attacker to the fragrouter the IP packet is sent and they are then fragmented and transformed to the party. 7.4 HONEYD Honeyd is a tool that creates virtual hosts on the network [6]. The services are used by the host Honeyd allows a single host to request multiple addresses on a LAN for networks simulation. It is possible to knock the virtual machines or to trace route them [6]. Any type of service on the virtual machine can be simulated according to a simple configuration file [6]. 7.5 KISMET It is a guideline for WIDS (Wireless intrusion detection system).WIDS compromises with packet payload and happenings of WIDS. It will find the burglar access point.
  • 11. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 41 8. NEEDS AND CHALLENGES For implementing an IPS device there are numerous challenges. The IPS device is designed to work inline presenting a potential choke point and single point of failure [18]. Some pursued attacks are undetected if the passive IDS fails and the network performances are impacted when the inline device fails. [18]. One of the components of network, the NIPS (Network intrusion prevention system) device must perform like a network switch. It must meet the network performance and reliability requirements to organise the challenges. Hence, very few customers are willing to sacrifice the network performance and reliability for security purposes [18]. A NIPS slows down the traffic and the issue of NIPS is dropped packets, they are used to accomplish data stream. Most high-end IPS vendors will get this problem by using custom hardware with advanced FPGAs and ASICs [18]. It is necessary to design the product to operate as an intrusion detection and prevention device [18]. Every organization needs IDS which is like a defence tool. There are some challenges the organizations face while deploying an intrusion detection system [8]. 1. IDS technology itself is undergoing a lot of enhancements. From the IDS implementation it is understood that it is important for an organisation. IDS technology does not need human interventions. Today an IDS technology offers some automation like notifying the administrator in case of detection of a malicious activity, shunning the malicious connection for a configurable period of time, dynamically modifying a router's access control list in order to stop a malicious connection [8]. For every event occurrence the IDS logs should be monitored. Monitoring the logs on a daily basis is required to analyze the activities which are detected by the IDS over a period of time [8]. 2. IDS implementation depends on the deployment success. Planning is important for the design and implementation phase. In most cases, it is desirable to implement a hybrid solution of network based and host based IDS [8]. The decision can vary between organizations. A network based IDS is an immediate choice for many organizations because of its ability to monitor multiple systems and also the fact that it does not require a software to be loaded on a production system unlike host based IDS [8]. Some of the organizations provide hybrid solution. So, the available resources are needed for a system before installing a host based sensor [8]. 3. The ratio of sensor manager should be acclaimed. It is very important to design the baseline policy before starting the IDS implementation and avoid false positives result. IDS sensor may send a lot of false positives result to the sensor and the ratio can be inadequate [8]. 4. The IDS technology is still reactive rather than proactive and this technology works on attack signatures [8]. Signatures are defined as a pattern of attacks which is defined earlier. The signature database needs to be updated whenever a different kind of attack is detected and they are fixed in the database and the frequency of signature update varies from vendor to vendor [8]. 5. Because of collision domains in switched network the traffic in and out port cannot be seen from any other host port. But in HUB based network in and out can be viewed from any of the port. NIDS sensor needs to detect traffic in and out of a port and for the malicious traffic in the switched environment. For achieving this kind they use port mirroring or spanning [8].
  • 12. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 42 9. IDS IN VARIOUS DOMAINS An IDS is used in numerous fields and the performance in each field is described and defines how they performed. 9.1 IDS in MANET Manet is defined as mobile adhoc network. It is an autonomous network that is composed naturally by the combinations of mobile nodes without centralized administration.IDS is used in Manet. Mobile network is normally needed in the battlefield for military people to get proper network [20]. Normally the messages are splited into number of packet and they use a hardware device like wire and modem to transmit. But, in Manet they are connected wirelessly. Watchdog and path rater are the two techniques added on the protocol in Adhoc. A watchdog identifies the misbehaving nodes by eavesdropping on the transmission of the next hop [20]. A path rater then helps to find the routes that do not contain those nodes [20]. IDS are used in Manet while transferring the series of packets to the destination through mobile network to find the intruder if any. 9.2 IDS FOR CLOUD COMPUTING Cloud computing is illustrated as internet based computing cloud where, virtual shared servers provide software infrastructure platform devices and other resources and hosting to customer as a service on pay-as you-use basis [21]. The user of the cloud does not hold any physical framework instead they lease from the mediator (third party). They pay only for the usage of the resource. Intrusion detection system plays an important role in the security and perseverance of active defense system against intruder hostile attacks for any business and IT organization [24]. In cloud computing the applications are received on the remote server of the provider and they have the control towards the usage of the data. IDMEF (Intrusion detection message exchange format) is the standard used in cloud for the communication purpose [21]. Cloud computing security issues Cloud data confidentiality Attacks on remote server Cloud security auditing Lack of data interoperability 9.3 IDS IN DATA MINING Data mining is the process of extracting the hidden knowledge from the databases. IDS are very important in data mining. Intrusion detection includes identifying a set of malicious actions that compromise the integrity and availability of information resources [22]. Intrusion detection in data mining has two divisions, they are, misuse detection and anomaly detection. In misuse detection the labeled data are built using anticipating model [23]. In anomaly detection there is a deviation between models. To use the data first it should be converted into
  • 13. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 43 featured data and the data mining models are applied to it and they are summarized to produce the result. TECHNICAL CHALLENGES Large data size Higher dimensionality Data preprocessing 10. CONCLUSION The main objective of this paper is to provide an overview of the necessity and utility of intrusion detection system. This paper gives complete study about types of IDS, life cycle, various domains, types of attacks and tools. IDS are becoming essential for day today security in corporate world and for network users. IPS defines about the preventing measures for the security. In the lifecycle the phases developed and the stages are illustrated. Still, there are more challenges to overcome. The techniques of anomaly detection and misuse detection are specifically illustrated and more techniques can be used. Further Work will be done on comparative analysis of some popular data mining algorithms applied to IDS and enhancing a classification based IDS using selective feedback methods. REFERENCES: [1] Corinne Lawrence- “IPS – The Future of Intrusion Detection”- University of Auckland - 26th October 2004. [2] Karthikeyan .K.R and A. Indra- “Intrusion Detection Tools and Techniques a Survey” [3] Anita K. Jones and Robert S. Sielken –“Computer System Intrusion Detection A Survey “International Journal of Computer Theory and Engineering, Vol.2, No.6, December, 2010 [4] Vera Marinova-Boncheva-“A Short Survey of Intrusion Detection Systems”-. Bulgarian academy of sciences. [5] Carl Endorf, Eugene Schultz, Jim Mellander “Intrusion detection & prevention” by Written-published by McGraw-Hill. [6] “Top 125 Network Security Tools”- SecTools.Org- http://sectools.org/tag/ids/sec [7] PeymanKabiri and Ali A.Ghorbani-“Research on Intrusion Detection and Response Survey”- International Journal of Network Security, Vol.1, No.2, PP.84–102, Sep. 2005 [8] Christopher Low –“Understanding Wireless attacks &detection “-GIAC Security Essentials Certification (GSEC) Practical Assignment 13 April 2005 -SANS Institute InfoSec Reading Room. [9] Bace, Rebecca-“An Introduction to Intrusion Detection &Assessment”- Infidel, Inc. for ICSA, Inc. [10] Rebecca Gurley Bace-“Intrusion Detection”- Macmillan Technical Publishing, 2000. [11] Denning, Dorothy E. – “An Intrusion Detection Model”- Proceedings of the Seventh IEEE Symposium on Security and Privacy May 1986 [12] Intrusion detection system buyer’s guide [13] “Global Information Assurance Certification Paper”- Copyright SANS Institute Copyright SANS Institute Author Retains Full Rights [14] “SANS penetration testing copyright by SANS”-Copyright SANS Institute Author Retains Full Rights. [15] Sriram Sundar Rajan, Vijaya Krishna Cherukuri-“An Overview of Intrusion Detection Systems”. [16] Asmaa Shaker Ashoor, Prof. Sharad Gore – “Importance of Intrusion Detection System”-International Journal of Scientific & Engineering Research, Volume 2, Issue 1, January-2011. [17] Paul Innella- “The Evolution of Intrusion Detection Systems“-Tetrad Digital Integrity, LLC.
  • 14. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015 44 [18] “Intrusion Detection and Intrusion Prevention”-Ed Sale VP of Security Pivot Group, LLC. [19] John McHugh, Alan Christie, and Julia Allen- “The Role of Intrusion Detection Systems”- Software Engineering Institute, CERT Coordination Center. [20] Shankar Sharan Tripathi, Sonu Agrawal- “A Survey on Enhanced Intrusion Detection System in Mobile Ad hoc Network”-International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 1, Issue 7, September 2012. [21] Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande – “Intrusion Detection System for Cloud Computing”. International Journal of Scientific & Technology Research Volume 1, Issue 4, May 2012 ISSN 2277-8616 67 IJSTR©2012. [22] Paul Dokas, Levent Ertoz, Vipin Kumar, Aleksandar Lazarevic, Jaideep Srivastava, Pang-Ning Tan- “Data Mining for Network Intrusion Detection”. [23] Aleksandar Lazarević,Jaideep Srivastava, Vipin Kumar-“Data Mining for intrusion detection”- Tutorial on the Pacific-Asia Conference on Knowledge Discovery in Databases 2003. [24] Ms Asiya Jaleel -“Security Challenge in Cloud Computing”- Provided by International Journal of Engineering Sciences & Research Technology (IJESRT), Feb 2014 AUTHORS BIOGRAPHY Dr. S. Vijayarani has completed MCA, M.Phil and Ph.D in Computer Science. She is working as Assistant Professor in the School of Computer Science and Engineering, Bharathiar University, Coimbatore. Her fields of research interest are data mining, privacy and security issues in data mining and data streams. She has published papers in the international journals and presented research papers in international and national conferences. Ms. Maria Sylviaa.S has completed Master of Com puter.Applications. She is currently pursuing her M.Phil in Computer Science in the School of Computer Science and Engineering, Bharathiar University, Coimbatore. Her fields of interest are Data Mining and Network Security.