Isaa Project Report 3
Isaa Project Report 3
Isaa Project Report 3
Project Report
Team Members:
Vishnu Kalra- 19BCE0374
Trinav Rattan- 19BCE0493
Aditya Pagaria- 19BCE0348
Submitted To:
Prof. Raja S P
In
B.Tech Computer Science Engineering
2
Abstract
1. Host based IDS: judge information obtained on one or multiple host systems
which incorporates contents of OS, system and applications. HIDS tends to be
additional correct and fewer false positive than network-based IDS since it
analyses the log files, and as a result, it will verify whether or not an attack
occurred.
Evaluation of Results
accomplish this by flooding the target with traffic, or sending it data that
triggers a crash. In either case, the DoS attack prevents legitimate users
from using the service or resource they expected.
Probing Attack
Probe-response attacks are a new threat to collective intrusion detection
systems. A probe is an attack that is deliberately crafted so its target
detects and reports it with a recognizable "fingerprint" within the report.
The attacker then uses the collective infrastructure to find out the
detector's location and defensive capabilities from this report.
network.
One approach for detecting each attack is to formulate each issue as a
binary classification problem by deciding whether or not to accept or
reject access requests from remote sites to local user machines or by
accepting or rejecting access as root makes an attempt.
Techniques
Evasion Techniques:
Being responsive to the techniques accessible to cyber criminals who are
attempting to breach a secure network will facilitate IT departments perceive
how IDS systems are often tricked into not missing actionable threats.
Fragmentation:
Sending fragmented parcels permits the assailant to remain under the radar,
bypassing the identification framework's capacity to identify the assault
signature.
Avoiding defaults:
A port utilised by a protocol doesn't continuously give an indication to the
protocol that’s being transported. If a hacker had modified it to use another
port,the IDS might not be ready to find the presence of a trojan.
Address spoofing/proxying:
Attackers will obscure the source of the attack by victimising poorly secured or
incorrectly organized proxy servers to bounce an attack. If the source is spoofed
and bounced by a server, it makes it very tough to find.
Mathematical Model
The attack classes are divided into 4 categories. These 4 categories are:
● DOS
● Probe
● R2L
● U2R
The following models will be used to compare the intrusion detection systems:
● Naive Bayes
● Decision Trees
● KNN
● Logistic Regression
7
Performance Evaluation
Precision and recall: Precision and recall are data retrieval performance
measurements that refer to a collection, corpus, or sample space.
Literature Survey
Introduction: This paper talks about how networks have grown in both size
and importance. In particular TCP/IP networks, and most notably the
world-wide Internet, have become the main means to exchange data and carry
out transactions. The source of events for analysis in Network-oriented Intrusion
Detection Systems (NIDSs) is a distributed system made up of multiple hosts
and network links. The purpose of NIDSs is to identify network-based threats
that may span several hosts. The NetSTAT technique describes network attacks
as state transition diagrams, where states and transitions are defined in a
networked context, as shown in this study.
Conclusion: The conclusion of this study is that intrusion detection systems are
based on host audit trails and network traffic analysis, with the purpose of
detecting attacks in real time. A number of prototype intrusion detection
systems have been built, and this concept has been proven to be extremely
promising. In the future, it is expected that the current prototypes will be
developed further in order to turn them into production-quality systems.
10
Introduction: The study described in this paper presents an IDS system based
on the KDDCUP'99 dataset and an artificial neural network (ANN).
Experiments clearly show that the suggested system can achieve an overall
accuracy of 99.9% when it comes to classifying predefined kinds of intrusion
attempts, which is a very good result when compared to existing methods. The
system has the ability of classifying these networks and packets according to a
set of predetermined parameters. The method of detection used in IDS systems
can be basically classified into two distinct types: Misuse or Signature Detection
and Anomaly Detection
13
Conclusion: The findings of this research show that the proposed neural
network can detect and classify normal or intrusive actions with a high correct
detection rate (average detection rate of 99.9%) using connection characteristics
and network packet analysis. The results suggest that IDS systems based on
anomaly are in fact a great alternative to widespread IDS systems based on
signature. With the exception of the R2L attack type, which only showed
median results in terms of mean squared error, a low index of false negatives
and false positives was still observed, resulting in an increase in network
manager productivity due to the reduction in false generated alarms analysis that
the IDS system would require.
[9] Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE
802.11 w data base
Author: Douglas W. F. L. Vilela; Anna Diva P. Lotufo; Carlos R. Santos
Code snippets
16
17
18
19
20
Graphical Outputs
Feature Importance
21
Conclusion
Intrusion Detection Systems (IDS) are the second layer of defence. It detects the
presence of attacks at intervals traffic that penetrates through the holes punched
into the firewall. An Intrusion Detection System (IDS) continuously observes
actions in a given environment to determine whether they are part of a potential
hostile attack or a legitimate use of the environment. The intrusion discovery
and intrusion avoidance fields are amazingly powerful, with new discoveries,
capacities, and models being made constantly. A lot of research on information
representation techniques for intrusion location information is additionally right
now being led. The study's findings revealed that data mining approaches
produce fascinating rules that are critical for intrusion detection and prevention
in the networking business. We showed however intrusion detection will have
the benefit of high-performance computing techniques. This project attempts to
address the problem of intrusion attack detection with the use of a data mining
supervised model. In conclusion, the findings of this study will help to improve
networking security standards.
Future Work
In future, it is possible to provide extensions or modifications to the proposed
clustering and classification algorithms using intelligent agents to achieve
further increased performance. Apart from the experimented combination of
data mining techniques, further combinations such as artificial intelligence, soft
computing and other deep learning algorithms can be used to improve the
detection accuracy and to reduce the rate of false negative alarm and false
positive alarm. Finally, the intrusion detection system can be extended as an
intrusion prevention system to enhance the performance of the system.
24
References
[1] Liao, H.J., Lin, C.H.R., Lin, Y.C. and Tung, K.Y., 2013. Intrusion detection
system: A comprehensive review. Journal of Network and Computer
Applications, 36(1), pp.16-24.
[4] Mukherjee, B., Heberlein, L.T. and Levitt, K.N., 1994. Network intrusion
detection. IEEE network, 8(3), pp.26-41.
[6] Bhanu Jyothi, H. C., J. Vidya, Swasthika Jain TJ, and D. S. Sahana. "Diverse
Malicious Attacks and security Analysis on MQTT protocol in IoT." (2017)
[7] Karaçay, Leyli, Erkay Savaş, and Halit Alptekin. "Intrusion Detection Over
Encrypted Network Data." The Computer Journal 63, no. 1 (2020): 604-619.
(2020)
[8] Agrawal, Gaurav, Shivank Kumar Soni, and Chetan Agrawal. "A survey on
attacks and approaches of intrusion detection systems." International Journal of
Advanced Research in Computer Science 8, no. 8 (2017): 499.
25
[9] Vilela, Douglas WFL, Anna Diva P. Lotufo, and Carlos R. Santos. "Fuzzy
ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11 w data
base." In 2018 International Joint Conference on Neural Networks (IJCNN), pp.
1-7. IEEE, 2018.
[10] Lokesak, Brandon. "A Comparison Between Signature Based and Anomaly
Based Intrusion Detection Systems." PPT). www. iup. Edu (2019)
[11] Vasisht, Samrat. "Method, system and device for automatically configuring
a communications network." U.S. Patent 9,363,709, issued June 7, 2016.
[12] Dias, L. P., Jés de Jesus Fiais Cerqueira, Karcius DR Assis, and Raul C.
Almeida. "Using artificial neural network in intrusion detection systems to
computer networks." In 2017 9th Computer Science and Electronic Engineering
(CEEC), pp. 145-150. IEEE, 2017.
[14] Mahendiran, Azhagiri & Appusamy, Rajesh & S, Karthik. (2015). Intrusion
Detection and Prevention System: Technologies and Challenges. International
Journal of Applied Engineering Research. 10. 1 - 12.