Abstract

This paper introduces network attacks, intrusion detection systems, intrusion prevention systems, and intrusion detection methods including signature-based detection and anomaly-based detection. Intrusion detection/prevention system (ID/PS) methods are compared. Some data mining and machine learning methods and their applications in intrusion detection are introduced. Big data in intrusion detection systems and Big Data analytics for huge volume of data, heterogeneous features, and real-time stream processing are presented. Challenges of intrusion detection systems and challenges posed by stream processing of big data in the systems are also discussed.

Highlights

  • Many classes and applications of cybercrime and terrorism contain a misrepresentation of identity or an attempt to authenticate for access to a business or services for which attackers have no legitimate use

  • This paper focuses on the following aspects: 1) attacks and intrusion detection methods including intrusion detection and prevention systems (IDPS) and attacks, signature-based detection, anomaly-based detection, and the challenges of intrusion detection systems; 2) some data mining and machine learning methods used in intrusion detection systems; 3) big data in intrusion detection systems including huge volumes of data and data fusion for heterogeneous sources, and real-time stream data and big data stream processing

  • The system is based on the Snort open-source network intrusion detection system (NIDS) that exploits the underutilized computational power of modern graphics cards to offload the costly pattern matching operations from the CPU, increasing the over-all processing throughput

Read more

Summary

Introduction

Many classes and applications of cybercrime and terrorism contain a misrepresentation of identity or an attempt to authenticate for access to a business or services for which attackers have no legitimate use. An IDS can monitor specific protocols like the Hyper Text Transfer Protocol (HTTP) of a web server. This type of IDS is called a protocol-based intrusion detection system (PIDS). IDSs can be specialized to monitor application-specific protocols like an application protocolbased intrusion detection system (APIDS). Four kinds of data can be gathered for correlation by a developed IDS in security monitoring They are: IP flow records, HTTP packets, DNS replies, and Honeypot data. Two approaches of attack identification are usually used in an IDS: 1) signatures that are specific defined elements of the network traffic and are possibly useful for identification; and 2) anomalies that are some deviation of the normal network behaviour. This paper focuses on the following aspects: 1) attacks and intrusion detection methods including IDPS and attacks, signature-based detection, anomaly-based detection, and the challenges of intrusion detection systems; 2) some data mining and machine learning methods used in intrusion detection systems; 3) big data in intrusion detection systems including huge volumes of data and data fusion for heterogeneous sources, and real-time stream data and big data stream processing

Attacks and Intrusion Detection Methods
Signature-based Detection
Anomaly-based Detection
Methods
Challenges of Intrusion Detection Systems
Some Data Mining and Machine Learning Methods Used in Intrusion Detection
Huge Volume of Data and Data Fusion for Heterogeneous Sources
Real-time Stream Data and Big Data Stream Processing
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call