Loading...
Search for: intrusion-detection-systems
0.015 seconds
Total 54 records

    A content-based deep intrusion detection system

    , Article International Journal of Information Security ; Volume 21, Issue 3 , 2022 , Pages 547-562 ; 16155262 (ISSN) Soltani, M ; Siavoshani, M. J ; Jahangir, A. H ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2022
    Abstract
    The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks... 

    A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things

    , Article Cluster Computing ; 2022 ; 13867857 (ISSN) Sangaiah, A. K ; Javadpour, A ; Ja’fari, F ; Pinto, P ; Zhang, W ; Balasubramanian, S ; Sharif University of Technology
    Springer  2022
    Abstract
    Cloud computing environments provide users with Internet-based services and one of their main challenges is security issues. Hence, using Intrusion Detection Systems (IDSs) as a defensive strategy in such environments is essential. Multiple parameters are used to evaluate the IDSs, the most important aspect of which is the feature selection method used for classifying the malicious and legitimate activities. We have organized this research to determine an effective feature selection method to increase the accuracy of the classifiers in detecting intrusion. A Hybrid Ant-Bee Colony Optimization (HABCO) method is proposed to convert the feature selection problem into an optimization problem. We... 

    A content-based deep intrusion detection system

    , Article International Journal of Information Security ; 2021 ; 16155262 (ISSN) Soltani, M ; Siavoshani, M. J ; Jahangir, A. H ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks... 

    End-to-End adversarial learning for intrusion detection in computer networks

    , Article 44th Annual IEEE Conference on Local Computer Networks, LCN 2019, 14 October 2019 through 17 October 2019 ; Volume 2019-October , 2019 , Pages 270-273 ; 9781728110288 (ISBN) Mohammadi, B ; Sabokrou, M ; Sharif University of Technology
    IEEE Computer Society  2019
    Abstract
    This paper presents a simple yet efficient method for an anomaly-based Intrusion Detection System (IDS). In reality, IDSs can be defined as a one-class classification system, where the normal traffic is the target class. The high diversity of network attacks in addition to the need for generalization, motivate us to propose a semi-supervised method. Inspired by the successes of Generative Adversarial Networks (GANs) for training deep models in semi-unsupervised setting, we have proposed an end-to-end deep architecture for IDS. The proposed architecture is composed of two deep networks, each of which trained by competing with each other to understand the underlying concept of the normal... 

    A semantic-based correlation approach for detecting hybrid and low-level APTs

    , Article Future Generation Computer Systems ; Volume 96 , 2019 , Pages 64-88 ; 0167739X (ISSN) Lajevardi, A. M ; Amini, M ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    Sophisticated and targeted malwares, which today are known as Advanced Persistent Threats (APTs), use multi-step, distributed, hybrid and low-level patterns to leak and exfiltrate information, manipulate data, or prevent progression of a program or mission. Since current intrusion detection systems (IDSs) and alert correlation systems do not correlate low-level operating system events with network events and use alert correlation instead of event correlation, the intruders use low and hybrid events in order to distribute the attack vector, hide malwares behaviors, and therefore make detection difficult for such detection systems. In this paper, a new approach for detecting hybrid and... 

    Feature selection and intrusion detection in cloud environment based on machine learning algorithms

    , Article Proceedings - 15th IEEE International Symposium on Parallel and Distributed Processing with Applications and 16th IEEE International Conference on Ubiquitous Computing and Communications, ISPA/IUCC 2017 ; 25 May , 2018 , Pages 1417-1421 ; 9781538637906 (ISBN) Javadpour, A ; Kazemi Abharian, S ; Wang, G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Characteristics and way of behavior of attacks and infiltrators on computer networks are usually very difficult and need an expert. In addition; the advancement of computer networks, the number of attacks and infiltrations is also increasing. In fact, the knowledge coming from expert will lose its value over time and must be updated and made available to the system and this makes the need for expert person always felt. In machine learning techniques, knowledge is extracted from the data itself which has diminished the role of the expert. Various methods used to detect intrusions, such as statistical models, safe system approach, neural networks, etc., all weaken the fact that it uses all the... 

    IDS modelling and evaluation in WANETs against black/grey-hole attacks using stochastic models

    , Article International Journal of Ad Hoc and Ubiquitous Computing ; Volume 27, Issue 3 , 2018 , Pages 171-186 ; 17438225 (ISSN) Entezari Maleki, R ; Gharib, M ; Khosravi, M ; Movaghar, A ; Sharif University of Technology
    Inderscience Enterprises Ltd  2018
    Abstract
    The aim of this paper is to model and evaluate the performance of intrusion detection systems (IDSs) facing black-hole and grey-hole attacks within wireless ad hoc networks (WANETs). The main performance metric of an IDS in a WANET can be defined as the mean time required for the IDS to detect an attack. To evaluate this measure, two types of stochastic models are used in this paper. In the first step, two different continuous time Markov chains (CTMCs) are proposed to model the attacks, and then, the method of computing the mean time to attack detection is presented. Since the number of states in the proposed CTMCs grows rapidly with increasing the number of intermediate nodes and the... 

    Detecting malicious packet drops and misroutings using header space analysis

    , Article 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 521-526 ; 9781509034345 (ISBN) Mohammadi, A. A ; Kazemian, P ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Software Defined Networking (SDN) provides a logically centralized view of the state of the network, and as a result opens up new ways to manage and monitor networks. In this paper we introduce a novel approach to network intrusion detection in SDNs that takes advantage of these attributes. Our approach can detect compromised routers that produce faulty messages, copy or steal traffic or maliciously drop certain types of packets. To identify these attacks and the affected switches, we correlate the forwarding state of network - i.e. installed forwarding rules - with the forwarding status of packets - i.e. the actual route packets take in the network and detect anomaly in routes. Thus, our... 

    RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection

    , Article Computers and Security ; Volume 49 , March , 2015 , Pages 206-219 ; 01674048 (ISSN) Ahmadian Ramaki, A ; Amini, M ; Ebrahimi Atani, R ; Sharif University of Technology
    Elsevier Ltd  2015
    Abstract
    Today, from information security perspective, prevention methods are not enough solely. Early Warning Systems (EWSs) are in the category of reactive methods. These systems are complementing Intrusion Detection Systems (IDSs) where their main goals include early detection of potential malicious behavior in large scale environments such as national level. An important process in EWSs is the analysis and correlation of alerts aggregated from the installed sensors (e.g., IDSs, IP telescopes, and botnet detection systems). In this paper, an efficient framework for alert correlation in EWSs is proposed. The framework includes a correlation scheme based on a combination of statistical and stream... 

    IDuFG: Introducing an intrusion detection using hybrid fuzzy genetic approach

    , Article International Journal of Network Security ; Volume 17, Issue 6 , 2015 , Pages 754-770 ; 1816353X (ISSN) Javadzadeh, G ; Azmi, R ; Sharif University of Technology
    Femto Technique Co., Ltd  2015
    Abstract
    In this paper, we propose a hybrid approach for designing Intrusion Detection Systems. This approach is based on a Fuzzy Genetic Machine Learning Algorithm to generate fuzzy rules. The rules are able to solve the classification problem in designing an anomaly IDS. The proposed approach supports multiple attack classification. It means that, it is able to detect five classes consist of Denial of Service, Remote to Local, User to Root, Probing and normal classes. We present a two-layer optimization approach based on Pittsburgh style and then combine it with Michigan style. To improve the performance of the proposed system, we take advantages of memetic approach and proposed an enhanced version... 

    Design and analysis of genetic fuzzy systems for intrusion detection in computer networks

    , Article Expert Systems with Applications ; Volume 38, Issue 6 , June , 2011 , Pages 7067-7075 ; 09574174 (ISSN) Abadeh, M. S ; Mohamadi, H ; Habibi, J ; Sharif University of Technology
    2011
    Abstract
    The capability of fuzzy systems to solve different kinds of problems has been demonstrated in several previous investigations. Genetic fuzzy systems (GFSs) hybridize the approximate reasoning method of fuzzy systems with the learning capability of evolutionary algorithms. The objective of this paper is to design and analysis of various kinds of genetic fuzzy systems to deal with intrusion detection problem as a new real-world application area which is not previously tackled with GFSs. The resulted intrusion detection system would be capable of detecting normal and abnormal behaviors in computer networks. We have presented three kinds of genetic fuzzy systems based on Michigan, Pittsburgh and... 

    A bayesian game approach for preventing DoS attacks in wireless sensor networks

    , Article Proceedings - 2009 WRI International Conference on Communications and Mobile Computing, CMC 2009, 6 January 2009 through 8 January 2009, Kunming, Yunnan ; Volume 3 , 2009 , Pages 507-511 ; 9780769535012 (ISBN) Mohi, M ; Movaghar, A ; Zadeh, P. M ; Sharif University of Technology
    2009
    Abstract
    Wireless sensor networks (WSNs) are a new technology, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act... 

    AIDSLK: an anomaly based intrusion detection system in linux kernel

    , Article Communications in Computer and Information Science ; Volume 31 , 2009 , Pages 232-243 ; 18650929 (ISSN); 9783642004049 (ISBN) Almassian, N ; Azmi, R ; Berenji, S ; Sharif University of Technology
    2009
    Abstract
    The growth of intelligent attacks has prompted the designers to envision the intrusion detection as a built-in process in operating systems. This paper investigates a novel anomaly-based intrusion detection mechanism which utilizes the manner of interactions between users and kernel processes. An adequate feature list has been prepared for distinction between normal and anomalous behavior. The method used is introducing a new component to Linux kernel as a wrapper module with necessary hook function to log initial data for preparing desired features list. SVM neural network was applied to classify and recognize input vectors. The sequence of delayed input vectors of features was appended to... 

    Misuse intrusion detection using a fuzzy-metaheuristic approach

    , Article 2nd Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, 13 May 2008 through 15 May 2008 ; 2008 , Pages 439-444 ; 9780769531366 (ISBN) Mohamadi, H ; Habibi, J ; Saniee Abadeh, M ; Sharif University of Technology
    2008
    Abstract
    In this paper, we use simulated annealing heuristics for constructing an intrusion detection system (IDS). The proposed IDS combines the learning ability of simulated annealing heuristics with the approximate reasoning method of fuzzy systems. The use of simulated annealing is an effort to effectively explore the large search space related to intrusion detection problems, and find the optimum set of fuzzy if-then rules. The aim of this paper is to present the capability of simulated annealing based fuzzy system to deal with intrusion detection classification problem as a new real-world application area. Experiments were performed with KDD-Cup99 intrusion detection benchmark data set. © 2008... 

    Intrusion detection in computer networks using tabu search based Fuzzy system

    , Article 2008 7th IEEE International Conference on Cybernetic Intelligent Systems, CIS 2008, London, 9 September 2008 through 10 September 2008 ; March , 2008 ; 9781424429141 (ISBN) Mohamadi, H ; Habibi, J ; Saadi, H ; Sharif University of Technology
    2008
    Abstract
    The process of scanning the events occurring in a computer system or network and analyzing them for warning of intrusions is known as intrusion detection system (IDS). This paper presents a new intrusion detection system based on tabu search based fuzzy system. Here, we use tabu search algorithm to effectively explore and exploit the large state space associated with intrusion detection as a complicated classification problem. Experiments were performed on KDD-Cup99 data set which has information about intrusive and normal behaviors on computer networks. Results show that the proposed method obtains notable accuracy and lower cost in comparison with several renowned algorithms  

    Computer intrusion detection using an iterative fuzzy rule learning approach

    , Article 2007 IEEE International Conference on Fuzzy Systems, FUZZY, London, 23 July 2007 through 26 July 2007 ; 2007 ; 10987584 (ISSN) ; 1424412102 (ISBN); 9781424412105 (ISBN) Saniee Abadeh, M ; Habibi, J ; Sharif University of Technology
    2007
    Abstract
    The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). The objective of this paper is to extract fuzzy classification rules for intrusion detection in computer networks. The proposed method is based on the iterative rule learning approach (IRL) to fuzzy rule base system design. The fuzzy rule base is generated in an incremental fashion, in that the evolutionary algorithm optimizes one fuzzy classifier rule at a time. The performance of final fuzzy classification system has been investigated using intrusion detection problem as a high-dimensional classification problem. Results show... 

    RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks

    , Article Computers and Security ; Volume 25, Issue 6 , 2006 , Pages 459-468 ; 01674048 (ISSN) Amini, M ; Jalili, R ; Shahriari, H. R ; Sharif University of Technology
    2006
    Abstract
    With the growing rate of network attacks, intelligent methods for detecting new attacks have attracted increasing interest. The RT-UNNID system, introduced in this paper, is one such system, capable of intelligent real-time intrusion detection using unsupervised neural networks. Unsupervised neural nets can improve their analysis of new data over time without retraining. In previous work, we evaluated Adaptive Resonance Theory (ART) and Self-Organizing Map (SOM) neural networks using offline data. In this paper, we present a real-time solution using unsupervised neural nets to detect known and new attacks in network traffic. We evaluated our approach using 27 types of attack, and observed... 

    Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks

    , Article First International Conference on Information Security, Practice and Experience, ISPEC 2005, 11 April 2005 through 14 April 2005 ; Volume 3439 , 2005 , Pages 192-203 ; 03029743 (ISSN) Jalili, R ; Imani Mehr, F ; Amini, M ; Shahriari, H. R ; Sharif University of Technology
    Springer Verlag  2005
    Abstract
    Although the prevention of Distributed Denial of Service (DDoS) attacks is not possible, detection of such attacks plays main role in preventing their progress. In the flooding attacks, especially new sophisticated DDoS, the attacker floods the network traffic toward the target computer by sending pseudo-normal packets. Therefore, multi-purpose IDSs do not offer a good performance (and accuracy) in detecting such kinds of attacks. In this paper, a novel method for detection of DDoS attacks has been introduced based on a statistical pre-processor and an unsupervised artificial neural net. In addition, SPUNNID system has been designed based on the proposed method. The statistical... 

    Machine Learning-Based Solutions for IoT Intrusion Security

    , M.Sc. Thesis Sharif University of Technology Moradi, Kamyab (Author) ; Hajsadeghi, Khosro (Supervisor)
    Abstract
    Nowadays, by integrating the Internet of Things systems into the daily life of humans, mankind has created a platform for providing numerous and diverse services through which life has become much simpler and more convenient. These systems have gradually become an integral part of today's life. They are used in many areas of production and service provision, such as healthcare, agricultural industry, supply chain, education system, transportation, and many others. Although these achievements have facilitated human life in many aspects, they are also associated with many security risks. Intrusion detection systems (IDS) are methods for predicting possible damage (through security attacks such... 

    Deep Learning-Based Intrusion Detection Systems in Industrial Control Systems

    , M.Sc. Thesis Sharif University of Technology Amir Hossein Salehi (Author) ; Aref, Mohammad Reza (Supervisor) ; Ahmadi, Siavash (Co-Supervisor)
    Abstract
    With the spread of threats against industrial control systems, preserving the security of these systems faces serious challenges. On the other hand, with the increase of communication between industrial control networks and external communication networks, the entry points of these networks have also increased and this exposes them to IP network threats. Beside that, traditional attacks on these systems, which generally occur by infiltrating the internal network, are also constantly changing and becoming more complex. These attacks mainly have a phase of hiding the attack from the monitoring systems, which eliminates the possibility of identifying the attacker's operations to a great extent...