Skip to main content

Network Aware Defenses for Intrusion Recognition and Response (NADIR)

  • Conference paper
  • First Online:
Proceedings of the Future Technologies Conference (FTC) 2018 (FTC 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 881))

Included in the following conference series:

  • 1987 Accesses

Abstract

It has become increasingly difficult to monitor computer networks as they have grown in scale and complexity. This lack of awareness makes responding to, or even recognizing, attacks a challenge. As a result, organizations’ reactions to attacks are delayed, typically leaving them to address the situation long after an incident has taken place. The central idea behind this research is to provide earlier notification of potential network attacks by using deceptive network service information as bait. These “decoy” or “honeyservices” will indicate system vulnerabilities which do not actually exist when suspicious network circumstances are detected. That is, although up-to-date versions of programs are installed and running, vulnerable software versions will be advertised when a potential attack or reconnaissance effort is detected. Exploits launched against these services will be unsuccessful, yet may provide valuable information about attacks. Our system uses a decision tree based learning algorithm to detect anomalous attack traffic and change its behavior to advertise honeyservices in response. By indicating the existence of fake vulnerabilities, our system is capable of collecting information about attacks earlier in the reconnaissance phase, potentially catching adversaries in the act without exposing any actual system weaknesses. Our solution effectively transforms any legitimate server into a honeypot without the added overhead of setting up and maintaining fake network infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Beale, J., Baker, A.R., Esler, J.: Snort: IDS and IPS Toolkit. Syngress, Burlington (2007)

    Google Scholar 

  2. Biles, S.: Detecting the unknown with snort and the statistical packet anomaly detection engine (spade). Computer Security Online Ltd., Technical report (2003)

    Google Scholar 

  3. Brugger, T.: KDD cup’99 dataset (network intrusion) considered harmful. KDnuggets Newsletter 7(18), 15 (2007)

    Google Scholar 

  4. Deng, L., Li, D., Yao, X., Cox, D., Wang, H.: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Cluster Comput. 1–16 (2018)

    Google Scholar 

  5. Dewa, Z., Maglaras, L.: Data mining and intrusion detection systems. Int. J. Adv. Comput. Sci. Appl. 7(1), 62–71 (2016)

    Google Scholar 

  6. Drimer, S., Murdoch, S.J., et al.: Keep your enemies close: distance bounding against smartcard relay attacks. In: USENIX Security Symposium, vol. 312 (2007)

    Google Scholar 

  7. Eibe, F., Hall, M., Witten, I., Pal, J.: The weka workbench. In: Online Appendix for Data Mining: Practical Machine Learning Tools and Techniques, 4th edn. (2016)

    Google Scholar 

  8. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: an update. ACM SIGKDD Explor. Newsl. 11(1), 10–18 (2009)

    Article  Google Scholar 

  9. Hamed, T., Dara, R., Kremer, S.C.: Network intrusion detection system based on recursive feature addition and bigram technique. Comput. Secur. 73, 137–155 (2018)

    Article  Google Scholar 

  10. Iglesias, F., Zseby, T.: Analysis of network traffic features for anomaly detection. Mach. Learn. 101(1–3), 59–84 (2015)

    Article  MathSciNet  Google Scholar 

  11. Khamphakdee, N., Benjamas, N., Saiyod, S.: Network traffic data to ARFF converter for association rules technique of data mining. In: Conference on Open Systems, pp. 89–93. IEEE (2014)

    Google Scholar 

  12. Lakhina, S., Joseph, S., Verma, B.: Feature reduction using principal component analysis for effective anomaly–based intrusion detection on NSL-KDD (2010)

    Google Scholar 

  13. Luo, Y., Wang, B., Cai, G.: Analysis of port hopping for proactive cyber defense. Int. J. Secur. Appl. 9(2), 123–134 (2015)

    Google Scholar 

  14. Maynor, D.: Metasploit toolkit for penetration testing, exploit development, and vulnerability research (2011)

    Google Scholar 

  15. McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans. Inf. Syst. Secur. (TISSEC) 3(4), 262–294 (2000)

    Article  Google Scholar 

  16. O’Gorman, J., Kearns, D., Aharoni, M.: Metasploit: The Penetration Tester’s Guide. No Starch Press, San Francisco (2011)

    Google Scholar 

  17. Paliwal, S., Gupta, R.: Denial-of-service, probing & remote to user (R2L) attack detection using genetic algorithm. Int. J. Comput. Appl. 60(19), 57–62 (2012)

    Google Scholar 

  18. Pham, N.T., Foo, E., Suriadi, S., Jeffrey, H., Lahza, H.F.M.: Improving performance of intrusion detection system using ensemble methods and feature selection. In: Proceedings of the Australasian Computer Science Week Multiconference, p. 2. ACM (2018)

    Google Scholar 

  19. Quinlan, J.: C4.5: Programs for Machine Learning (1993)

    Google Scholar 

  20. Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of the 13th Conference on System Administration. USENIX Association (1999)

    Google Scholar 

  21. Serbanescu, A., Obermeier, S., Yu, D.-Y.: A scalable honeynet architecture for industrial control systems. In: International Conference on E-business and Telecommunications, pp. 179–200. Springer (2015)

    Google Scholar 

  22. Shimamura, M., Ikenaga, T., Tsuru, M.: A design and prototyping of in-network processing platform to enable adaptive network services. Trans. Inf. Syst. 96(2), 238–248 (2013)

    Article  Google Scholar 

  23. Shone, N., Ngoc, T., Phai, V., Shi, Q.: A deep learning approach to network intrusion detection. Trans. Emerg. Top. Comput. Intell. 2(1), 41–50 (2018)

    Article  Google Scholar 

  24. Spitzner, L.: Honeypots: catching the insider threat. In: 19th Annual Computer Security Applications Conference, pp. 170–179. IEEE (2003)

    Google Scholar 

  25. Subba, B., Biswas, S., Karmakar, S.: A neural network based system for intrusion detection and attack classification. In: Twenty Second National Conference on Communication, pp. 1–6. IEEE (2016)

    Google Scholar 

  26. Swamy, K., Lakshmi, K.V.: Network intrusion detection using improved decision tree algorithm. Int. J. Comput. Sci. Inf. Secur. 10(8), 26 (2012)

    Google Scholar 

  27. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6. IEEE (2009)

    Google Scholar 

  28. Tran, T., Aib, I., Al-Shaer, E., Boutaba, R.: An evasive attack on snort flowbits. In: Network Operations and Management Symposium, pp. 351–358. IEEE (2012)

    Google Scholar 

  29. Wang, K., Stolfo, S.: Anomalous payload-based network intrusion detection. In: International Workshop on Recent Advances in Intrusion Detection, pp. 203–222. Springer (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jonathan Voris .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Assawakomenkool, N., Patel, Y., Voris, J. (2019). Network Aware Defenses for Intrusion Recognition and Response (NADIR). In: Arai, K., Bhatia, R., Kapoor, S. (eds) Proceedings of the Future Technologies Conference (FTC) 2018. FTC 2018. Advances in Intelligent Systems and Computing, vol 881. Springer, Cham. https://doi.org/10.1007/978-3-030-02683-7_17

Download citation

Publish with us

Policies and ethics