Aravamudhan 2021 J. Phys. Conf. Ser. 1916 012179
Aravamudhan 2021 J. Phys. Conf. Ser. 1916 012179
Aravamudhan 2021 J. Phys. Conf. Ser. 1916 012179
Abstract. Over the past few years the development in the mobile industry and development of
internet, network for all, 4G, 5G etc. enabled the ordinary people as well as the elite people to
depend upon mobile networks for regular business developments, entertainment, medical and
educational needs. Almost all areas of development depend on the so called improvement of
the mobile network. As the advantages and flexibility increases, the consumers entering by
new registration increase widely and service requirement of existing consumers increase
massively. It is mandatory to provide high level of security and dual privacy protection to the
users sharing the large set of information through the cloud. The massive crowd sensing is
important for any kind of network security system to ensure the detection of any miscellaneous
activity entering the network grid. The study is focused on gathering various literature
evidences on demand for intrusion detection system, analyzing the pitfalls in current models
and creating an idea that would be helpful for us to proceed further with the research on
intrusion detection system implementations and innovating a novel methodology that
improvise from the present system. The future enhancement and interpretations on solutions
would be discussed too.
Keywords: intrusion detection system, network security, cloud security, internet of things,
edge detection systems, deep learning, cloud computing.
1. INTRODUCTION
Protecting the network from miscellaneous activity is mandatory and that would save a huge data
which may be hacked in suspicious activity. The important part of any system management is to
protect it from network hazards and ensuring high level of security [1]. The large amount of
confidential data, transaction data, activities and follow ups are uploaded to the network in current
days through simple steps. Hence it has become flexible for end users to upload the data more
frequently and through hassle free steps. Every time the user login to the particular network it enables
the port open to accept all the inputs for a certain period of time frame. This key gap is enough for the
hackers and third party users to enter and grab the most privileged information from the network grid.
Intrusion detection systems are small tools or software that acts as a ingress guard in the network
points to ignore the miscellaneous activity during heavy traffic. The IDS (Intrusion Detection System)
provides dual stack security, ensure the authenticated entry to protect the network from Internet
attacks. Firewall provides basic security to the system, to protect the grid from third party attacks. [2]
The design of IDS depends on the type of information, quality and weightage of the system. The
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd 1
ICCCEBS 2021 IOP Publishing
Journal of Physics: Conference Series 1916 (2021) 012179 doi:10.1088/1742-6596/1916/1/012179
system follows certain rules and policies to find out and troubleshoot such online threats, malware
attacks or any kind of intrusions and to safe guards both the edge computing devices and data.
1.1 Classification of Intrusion Detection System
Intrusion detection systems are broadly classified as follows:
2
ICCCEBS 2021 IOP Publishing
Journal of Physics: Conference Series 1916 (2021) 012179 doi:10.1088/1742-6596/1916/1/012179
machine learning models create a trustworthy activity which detects and probe the root cause of the
problem. They can be modeled or programmed according to the applications and configurations.
1.3 Familiar IDS Tools
Supersonic Naval Ordnance Research Track (SNORT) developed by Cisco Systems which is capable
of performing real-time traffic analysis and packet logging on IP networks based on interruption
discovery framework programming.
Open Source HIDS Security (OSSEC) is an excellent host-based interruption discovery framework that
performs log analysis, integrity checking, windows registry monitoring, rootkit detection time-based
alerting and active responses.
Sagan is a log investigation instrument that can coordinate reports created on grunt information. So it
is a HIDS with a touch of NIDS.
Security Onion is a network checking security device comprised of many components pulled in from
other free devices which detects and prevents many exploits in the network.
Advanced Intrusion Detection Environment (AIDE) is a HIDS for checking the integrity of files for
Unix, Linux, and Mac OS.
Open Source WIPS-NG Wireless NIDS and interruption anticipation framework from the producers of
Aircrack-NG monitors all the 2.4 channels using multiple cards.
Samhain is an open-source multiplatform application for POSIX systems (Unix, Linux, MACOS,
Cygwin / Windows), which integrates and maintains the log files.
Fail to Ban is an intrusion prevention software framework that protects computer servers from brute-
force attacks. It is lightweight, host-based interruption identification programming framework for
Unix, Linux, and Mac OS.
2. LITERATURE STUDY
[3] The research work proposed an intrusion detection system that decodes the packets and check
every time it enters the network. It automatically detects the malwares or miscellaneous activity held.
The IDS in this paper is implemented with alert system that produce sound in case of any suspicious
activity held.
Conducted research work on intrusion detection and prevention system through deep learning
algorithms. They utilized kddcup99 dataset for testing and training. The implementation is divided
into two categories, one for intrusion detection system and another for intrusion prevention system.
The proposed system
uses MLP (Multi Layer Perceptron) for batch processing and achieved 91.4% accuracy in prediction.
Developed research work on novel triple intrusion detection system, in which the IDPS ensures secure
connection with SDN-IOT in terms of failure analysis, accuracy, precision, delay, traffic crown
sensing etc. They have used fuzzy based authentication system. They have concluded with further
3
ICCCEBS 2021 IOP Publishing
Journal of Physics: Conference Series 1916 (2021) 012179 doi:10.1088/1742-6596/1916/1/012179
improvements needed with privacy preserving model with new authentication technologies.
[4] The proposed paper uses mutual authentication scheme that analyze outdoor resilience and indoor
resilience that covers the attacks such as Relay attacks and MITM attacks, quantity attacks etc., They
concluded that sophisticated protocols enable better security on IOT networks.
[5] They proposed a research paper with machine learning approach for cyber-attacks detection using
Bayesian networks. The system focused on query based attack detection system. The conclusion of
the paper provides that effectiveness of the signature based method need to be improved and robust
authentication IDS are required.
[6] Research work on mobile ad-hoc network based smart IDS is evaluated for MANER-Security.
They have utilized artificial neural network (ANN) for data packets classification. They stated that
classification plays a major criteria in intrusion detection. Boat classifier is developed here. The
system is efficient in rare attacks, Dos and probing problems are discussed [7].
[8] Their study is on home level intrusion detection system, using Wifi-Enabled IOT devices. They
implemented a RSSI (Received signal strength indicator) based identification router that incorporate
with a detection algorithm and visualize the whole home security through IOT. The idea of IOT
security with RSSI gives apt results for them, that they concluded proposed design optimizes accurate
detection.
[9] Proposed study and implementation on IDS in edge routed networks that blend with Dos attack
analysis, edge network intrusion detection, edge node cloud security etc., SDMMF single-layered
Min-max fair allocation scheme is used. The concluded paper states that they have given efficient
solution for multi-layer resource allocation problem [10].
[11] Their study is focused on challenges and imbalances within the supervised ML algorithms, real-
Time interfaces and NFV - Network Function Virtualization which creates a new working paradigm.
Moreover ML requires more cloud security protocol for frequently changing cloud environment.
[12] The study conducted to learn about the challenges in intrusion detection system in-terms of
performance, privacy preserving authentications and energy consumptions over the network etc. This
paper also discussed about the limitations of the deep information gathering, the challenges in IDS
systems, research overlaps and obstacles etc.
4
ICCCEBS 2021 IOP Publishing
Journal of Physics: Conference Series 1916 (2021) 012179 doi:10.1088/1742-6596/1916/1/012179
monitor keeps the data for further analysis. Each monitor connected with the CCIDS that grab the
information from the local network traffic.
5
ICCCEBS 2021 IOP Publishing
Journal of Physics: Conference Series 1916 (2021) 012179 doi:10.1088/1742-6596/1916/1/012179
The increased demand on IOT access is the major factor for need for robust IDS in massive internet
networks. The Strength of IOTs network depends on the effective data-read and feature extraction
capabilities [15]. So many third party cloud service vendors available in current epoch make the cloud
weighted and crowded. This kind of IDSS is mandatory at the edge computing of the Cloud services.
The importance of IDSS is reflected at the IOT gateway frameworks.
6
ICCCEBS 2021 IOP Publishing
Journal of Physics: Conference Series 1916 (2021) 012179 doi:10.1088/1742-6596/1916/1/012179
7
ICCCEBS 2021 IOP Publishing
Journal of Physics: Conference Series 1916 (2021) 012179 doi:10.1088/1742-6596/1916/1/012179
8
ICCCEBS 2021 IOP Publishing
Journal of Physics: Conference Series 1916 (2021) 012179 doi:10.1088/1742-6596/1916/1/012179
10 Novel Three-tier Amir Ali, 2020 Blowfish algorithm applicable for non-
intrusion Muhammad dynamic key in
detection system Murtaza Yousaf networks.
5 DISCUSSIONS
It is evident from the literature reviews above that the demand in intrusion detection support system is
quite increasing with respect to the increased population of users approaching IOT networks. To
safeguard the user and the edge computing devices, efficient intrusion detection, prediction and
analysis system is mandatory in near future. Reviews of convey us the basic idea on intrusion
detection systems, the prediction models using neural networks and the results which were discussed.
Stated the privacy preserving key authentication protocols and the need for improvised dual stack
security in demand. Explains the machine learning impacts on implementing the strong security wall
on intrusion detection systems. Allocations of space and system connectivity needs were discussed.
Analysis of IDS in cloud security is another important factor that needs to be taken care of during the
installation of IDS.
7 CONCLUSION
Emerging growth of Internet of things and increased demand of users for flexibility, a number of
unauthorized applications take control of the device like computers, mobile devices and many smart
connectivity enabled devices. The need for intrusion detection and support system and the challenges
in existing implementations are discussed. The need for providing dual stack security enabled
authentication protocols are highly required in edge computing devices and centralized IDSS become
more compulsive things in IoT environment. The study reveals the challenges in developing an
efficient IDSS and discussed in depth about the approaches that need to be improved. It is clear from
the study that there is a need for robust IDSS modules in dynamically changing environments of
massive internet of things. It provides evidence that random attacks and unauthorized third party entry
would be highly controlled. Keeping such valuable points, further research work improved by
implementing adjustable IDSS frameworks, to safeguard the IoT networks from dynamically
challenging changes and attacks.
REFERENCES
[1] Sheikh Tahir Bakhsh, Saleh Alghamdi, Rayan A Alsemmeari and Syed Raheel Hassan, An
adaptive intrusion detection and prevention system for Internet of Things SAGE open access
journal in Soft Computing in Intrusion Detection System, published Volume : 15 Issue : 11
published Year 2019.
9
ICCCEBS 2021 IOP Publishing
Journal of Physics: Conference Series 1916 (2021) 012179 doi:10.1088/1742-6596/1916/1/012179
[2] Akhil Krishna, Dhanya Sarah Jacob, Ashik Lal M A, Hari M and Athul Joe Mathewkutty
Research on Intrusion Detection & Prevention model Using Deep Learning, International
Conference on Electronics and Sustainable Communication Systems (ICESC), ISBN: 978-1-
7281-4108-4, published Year 2020.
[3] Amir Ali and Muhammad Murtaza Yousaf, Research entitled Novel three- tier Intrusion
Detection and Prevention System in Software Defined Network, in IEEE Open-Access Volume :
8, ISSN: 2169-3536, Year 2020.
[4] Zhigang Huang ; Lei Zhang ; Xinyu Meng ; Kim-Kwang Raymond Choo, Key-Free
Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home, IEEE
Internet of Things journal, Volume: 7, Issue: 2, ISSN: 2327-4662, published Year 2019.
[5] Rafał Kozik & Michałl Choras, Machine Learning Techniques for Cyber Attacks Detection,
Advances in Intelligent Systems and Computing book series Springer International Published
Volume: 233, ISBN: 978-3-319-01621-4, published Year 2014.
[6] M Islabudeen and MK Kavitha Devi A Smart Approach for Intrusion Detection and Prevention
System in Mobile Ad-hoc Networks Against Security Attacks, Wireless Personal
Communications Springer International published Year 2020.
[7] Nadia Chaabouni, Mohamed Mosbah, Akka Zemmari, Cyrille Sauvignac and Parvez Faruki,
Network Intrusion Detection for IoT Security Based on Learning Techniques, in IEEE
Communication Surveys, Volume: 21, Issue: 3, ISSN: 1553-877X, Published Year 2019.
[8] Yue Jin, Zengshan Tian, Mu Zhou, Ze Li and Zhenyuan Zhang. A Whole-Home Level Intrusion
Detection System using WiFi-enabled IoT International Wireless Communications & Mobile
Computing Conference (IWCMC), ISSN: 2376-6506, Published Year 2018.
[9] Fuhong Lin, Yutong Zhou, Xingsuo An, Ilsun You, Fair Resource Allocation in an Intrusion
Detection System: Ensuring the Security of Internet of Things Devices, IEEE conference on
Consumer electronics Computing Magazine, Volume: 7, Issue: 6, ISSN: 2162-2248,
publishedYear 2018.
[10] Mohammad Saeid Mahdavinejad, Mohammadreza Rezvan, Mohammadamin Barekatain Peyman
Adibi, Payam Barnaghi, Amit P Sheth Machine learning for internet of things data analysis: a
survey Digital Communications and Networks Science Direct, Volume:4, Issue 3, Pages: 161-
175, published Year 2018.
[11] PrakashDuraisamy, XiaohuiYuan, ElSaba,A. and Sumithra Palanisamy, Contrast enhancement
and assessment of OCT images, Proceedings of International Conference on Informatics,
Electronics & Vision (ICIEV), 2012 Date: 18-19 May 2012 pp.91-95(Location :Dhaka, Print
ISBN: 978-1-4673-1153-3,INSPEC Accession Number: 13058449,Digital Object Identifier
:10.1109/ICIEV.2012.6317381)
[12] Sumithra M. G., Thanushkodi, K. and Helan Jenifer Archana ,A. A New Speaker Recognition
System with Combined Feature Extraction Techniques , Journal of Computer Science, Vol. 7,
Issue 4, pp.459- 465, 2011. (With impact factor SNIP of 0.162 and SJR of0.034).
[13] Balasaraswathi, M., Srinivasan, K., Udayakumar, L., Sivasakthiselvan, S. and Sumithra, M.G.,
2020. Big data analytic of contexts and cascading tourism for smart city. Materials Today:
Proceedings.
[14] Sivakumar, P., Boopathi, C.S., Sumithra, M.G., Singh, M., Malhotra, J. and Grover, A., 2020.
Ultra-high capacity long-haul PDM-16-QAM-based WDM-FSO transmission system using
coherent detection and digital signal processing. Optical and Quantum Electronics, 52(11), pp.1-
18.
[15] Jinug Seok, Moonseok Choi, Jimyung Kim and Jonsung Park A Comparative Study on
Performance of Open Source IDS/IPS Snort and Suricata, Journal of the Korea Society of Digital
Industry and Information Management, published Year 2016.
[16] Yakuta Tayyebi and D. S. Bhilare Cloud Security through Intrusion Detection System (IDS):
Review of Existing Solutions, International Journal of Emerging Trends & Technology in
Computer Science (IJETTCS), Volume 4, Issue 6, published Year 2015.
10
ICCCEBS 2021 IOP Publishing
Journal of Physics: Conference Series 1916 (2021) 012179 doi:10.1088/1742-6596/1916/1/012179
[17] J.Smith, Machine Learning With Matlab: Supervised Learning and Regression CreateSpace
Independent Publishing Platform, published Year 2017. (FiZic-Format).
11