Layered Approach using Conditional Random Fields For Intrusion Detection.

Slides:



Advertisements
Similar presentations
Bandwidth Estimation for IEEE Based Ad Hoc Networks.
Advertisements

ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
CLOSENESS: A NEW PRIVACY MEASURE FOR DATA PUBLISHING
A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Abstract Shortest distance query is a fundamental operation in large-scale networks. Many existing methods in the literature take a landmark embedding.
Department Of Computer Engineering
INTRUSION DETECTION SYSTEM
On the Node Clone Detection inWireless Sensor Networks.
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
Energy-Optimum Throughput and Carrier Sensing Rate in CSMA-Based Wireless Networks.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Introduction to Windows XP Professional Chapter 2 powered by dj.
Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
Detecting Network Violation Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
NICE :Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
Privacy-Preserving Public Auditing for Secure Cloud Storage
Using Neural Networks in Database Mining Tino Jimenez CS157B MW 9-10:15 February 19, 2009.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
m-Privacy for Collaborative Data Publishing
EAACK—A Secure Intrusion-Detection System for MANETs
A Fast Clustering-Based Feature Subset Selection Algorithm for High- Dimensional Data.
Protecting Sensitive Labels in Social Network Data Anonymization.
ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA( ) 04/07/2013.
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks.
Abstract Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing.
A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis.
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
Anomaly Detection via Online Over-Sampling Principal Component Analysis.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
Bandwidth Distributed Denial of Service: Attacks and Defenses.
Preventing Private Information Inference Attacks on Social Networks.
DTRAB Combating Against Attacks on Encrypted Protocols through Traffic- Feature Analysis.
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
m-Privacy for Collaborative Data Publishing
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
Dealing With Concept Drifts in Process Mining. Abstract Although most business processes change over time, contemporary process mining techniques tend.
Privacy-Preserving and Content-Protecting Location Based Queries.
Energy-Efficient Protocol for Cooperative Networks.
High Throughput and Programmable Online Traffic Classifier on FPGA Author: Da Tong, Lu Sun, Kiran Kumar Matam, Viktor Prasanna Publisher: FPGA 2013 Presenter:
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
Whole Test Suite Generation. Abstract Not all bugs lead to program crashes, and not always is there a formal specification to check the correctness of.
ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM MODELING.
Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Intrusion Detection-An Energy Efficient Approach In Heterogeneous WSN Department Of Computer Science and Engineering ADARSH COLLEGE OF ENGINEERING CHEBROLU.
PRESENTED BY. Keywords Firewall : Any barrier that is intended to thwart the spread of a destructive agent. Computer Definition : A system designed to.
BY S.S.SUDHEER VARMA (13NT1D5816)
In the name of God.
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Under Guidance- Internal Guide- Ms. Shruti T.V
Distributed Network Traffic Feature Extraction for a Real-time IDS
Hacker Detection in Wireless sensor network
ABSTRACT   Recent work has shown that sink mobility along a constrained path can improve the energy efficiency in wireless sensor networks. Due to the.
ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION
Abstract Intrusion detection in networks is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection.
STEGANOGRAPHY.
Department Of Computer Science Engineering
Presentation transcript:

Layered Approach using Conditional Random Fields For Intrusion Detection

ABSTRACT: Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, we address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered Approach. We demonstrate that high attack detection accuracy can be achieved by using Conditional Random Fields and high efficiency by implementing the Layered Approach. Intrusion detection is one of the high priority and challenging tasks for network administrators and security professionals. More sophisticated security tools mean that the attackers come up with newer and more advanced penetration methods to defeat the installed security systems. Finally, our system has the advantage that the number of layers can be increased or decreased depending upon the environment in which the system is deployed, giving flexibility to the network administrators. The areas for future research include the use of our method for extracting features that can aid in the development of signatures for signature-based systems. The signature-based systems can be deployed at the periphery of a network to filter out attacks that are frequent and previously known, leaving the detection of new unknown attacks for anomaly and hybrid systems..

EXISTING SYSTEM Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. It is a fundamental issue to characterize the WSN parameters such as node density and sensing range in terms of a desirable detection probability. In addition, we discuss the network connectivity and broadcast reach ability, which are necessary conditions to ensure the corresponding detection probability in a WSN.

In analyzes the intrusion detection problem in both homogeneous and heterogeneous WSNs by characterizing intrusion detection probability with respect to the intrusion distance and the network parameters. Intrusion detection model includes a network model, a detection model, and an intrusion strategy model. The network model specifies the WSN environment. In analyzes the intrusion detection problem in both homogeneous and heterogeneous WSNs by characterizing intrusion detection probability with respect to the intrusion distance and the network parameters. Intrusion detection model includes a network model, a detection model, and an intrusion strategy model. The network model specifies the WSN environment.

PROPOSED SYSTEM In this paper, we have addressed the dual problem of Accuracy and Efficiency for building robust and efficient intrusion detection systems. Our experimental results in Section 6 show that CRFs are very effective in improving the attack detection rate and decreasing the FAR. Having a low FAR is very important for any intrusion detection system. Further, feature selection and implementing the Layered Approach significantly reduce the time required to train and test the model. Having a low FAR is very important for any intrusion detection system. Further, feature selection and implementing the Layered Approach significantly reduce the time required to train and test the model.

The areas for future research include the use of our method for extracting features that can aid in the development of signatures for signature- based systems. The signature-based systems can be deployed at the periphery of a network to filter out attacks that are frequent and previously known, leaving the detection of new unknown attacks for anomaly and hybrid systems. Finally, our system has the advantage that the number of layers can be increased or decreased depending upon the environment in which the system is deployed, giving flexibility to the network administrators.

ADVANTAGES & DISADVANTAGES Disadvantage: The sensed information provided by a single sensor might be inadequate for recognizing the intruder. So that there is no guarantee for our information has been sent securely. Advantage: Through sensing the network we able to find possible node in the wireless Sensor network. By finding the intruders we can send our information in a secured manner.

Hardware Requirements: Processor : Pentium IV 2.8GHz. RAM : 512 MB RAM. Hard Disk : 40 GB. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor.

Software Requirements: Operating System : Windows XP Language : JDK 1.5.

Modules CONSTRUCTING NETWORK SECURITY RANDOMIZED FIELD DETCTION

CONSTRUCTING NETWORK SECURITY  In this module, we are going to connect the network each node is connected the neighboring node and it is independently deployed in network area. And also deploy the each port no is authorized in a node. Intrusion detection as defined by the Sys Admin, Audit, Networking, and Security (SANS) Institute is the art of detecting inappropriate, inaccurate, or anomalous activity. Today, intrusion detection is one of the high priority and challenging tasks for network administrators and security professionals.

RANDOMIZED FIELD DETCTION In this module, browse and select the source file. And selected data is converted into fixed size of packets. And the packet is send from source to detector. Conditional models are probabilistic systems that are used to model the conditional distribution over a set of random variables. Such models have been extensively used in the natural language processing tasks. Conditional models offer a better framework as they do not make any unwarranted assumptions on the observations and can be used to model rich overlapping features among the visible observations. In this module, browse and select the source file. And selected data is converted into fixed size of packets. And the packet is send from source to detector. Conditional models are probabilistic systems that are used to model the conditional distribution over a set of random variables. Such models have been extensively used in the natural language processing tasks. Conditional models offer a better framework as they do not make any unwarranted assumptions on the observations and can be used to model rich overlapping features among the visible observations.

DATA FLOW DIAGRAM DATA FLOW DIAGRAM In proposed system, we address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered Approach. High attack detection accuracy can be achieved by using Conditional Random Fields and high efficiency by implementing the Layered Approach. Experimental results show that our proposed system based on Layered Conditional Random Fields outperforms other well-known methods such as the decision trees and the naive Bayes.

Spec Trans Detect1 Dest Dos Spec Trans Detect3 Detect2 Dest Probe R2L

MODULE DIAGRAM Source Detector Dest File Dialog Select The Source File Fixed Size of Packet Detector Source

REFERENCES: [1] Autonomous Agents for Intrusion Detection, purdue.edu/research/aafid/, [2] CRF++: Yet Another CRF Toolkit, [3] KDD Cup 1999 Intrusion Detection Data, databases/kddcup99/kddcup99.html, [4] Overview of Attack Trends, attack_trends.pdf, [5] Probabilistic Agent Based Intrusion Detection, edu/research/isl/agentIDS.shtml,