Advertisement

A Novel Mechanism for Host-Based Intrusion Detection System

  • Ch. Gayathri HarshithaEmail author
  • M. Kameswara Rao
  • P. Neelesh Kumar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1045)

Abstract

Today, the world is progressively associated with the Internet so that the attackers and hackers are having a high opportunity to enter PCs and networks. In today’s world hackers are using different types of attacks for receiving valuable information. It is important to recognize these attacks ahead of time to secure end clients and the system effects. Intrusion detection system (IDS) has been generally conveyed in PCs and systems to recognize the variety of attacks. In this paper, the basic observation is on log monitoring in host-based intrusion detection systems. In this paper, host-based intrusion detection is achieved using OSSEC tool. By using the OSSEC, the system is capable of detecting the malicious logs which run in the background from the system.

Keywords

Intrusion detection system Host-based OSSEC Malicious logs Log monitoring 

References

  1. 1.
    Korba, A.A., Nafaa, M., Ghamri-Doudane, Y.: Anomaly-based intrusion detection system for ad hoc networks. 978-1-5090-4671-3/16/$31.00 ©2016 IEEEGoogle Scholar
  2. 2.
    Shaikh, A.A., Qi, H., Jiang, W., Tahir, M.: A novel HIDS and log collection based system for digital forensics in cloud environment. In: 2017 3rd IEEE International Conference on Computer and CommunicationsGoogle Scholar
  3. 3.
    Jacoby, G.A., Davis, N.J.: Mobile Host-Based Intrusion Detection and Attack Identification. IEEE Wirel. Commun. 14, 53–60 (2007). 1536-1284/07/$20.00 ©2007 IEEEGoogle Scholar
  4. 4.
    Suda, H., Natsui, M., Hanyu, T.: Systematic intrusion detection technique for an in-vehicle network based on time-series feature extraction. In: 2018 IEEE 48th International Symposium on Multiple-Valued LogicGoogle Scholar
  5. 5.
  6. 6.
    Garcia, K.A., Monroy, R., Trejo, L.A., Mex-Perera, C., Aguirre, E.: Analyzing log files for postmortem intrusion detection. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 42(6) 1690–1704 (2012)Google Scholar
  7. 7.
    Lydia Catherine, F., Pathak, R., Vaidehi, V.: Efficient host based intrusion detection system using Partial Decision Tree and Correlation feature selection algorithm. In: 2014 International Conference on Recent Trends in Information TechnologyGoogle Scholar
  8. 8.
    Nobakht, M., Sivaraman, V., Boreli, R.: A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In: 2016 11th International Conference on Availability, Reliability and SecurityGoogle Scholar
  9. 9.
    Zhu, M., Huang, Z.: Intrusion detection system based on data mining for host log. 978-1-4673-8979-2/17/$31.00 ©2017 IEEEGoogle Scholar
  10. 10.
    Lounis, O., Malika, B.: A new vision for intrusion detection system in information systems. In: Science and Information Conference (2015)Google Scholar
  11. 11.
    Raghavender, K.V., Premchand, P.: Host based intrusion detection system-file integrity checkGoogle Scholar
  12. 12.
    Nema, S., Raghuwanshi, S.S.: An innovative method to improve security in cloud: using LDAP and OSSEC. Int. J. Innov. Res. Comput. Commun. Eng. 2(11) (2014)Google Scholar
  13. 13.
    Ambati, S.B., Vidyarthi, D.: A brief study and comparison of, open source intrusion detection system tools. Int. J. Adv. Comput. Eng. Netw. ISSN: 2320-2106Google Scholar
  14. 14.
    Badgujar, T., More, P.: An intrusion detection system implementing host based attacks using layered framework. In: IEEE Sponsored 2nd International Conference on Innovations in Information, Embedded and Communication systems (ICIIECS) (2015)Google Scholar
  15. 15.
    Mishra, V.P., Shukla, B.: Development of simulator for intrusion detection system to detect and alarm the DDoS attacks. 978-1-5386-0514-1/17/$31.00 ©2017 IEEEGoogle Scholar
  16. 16.
  17. 17.
  18. 18.

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Ch. Gayathri Harshitha
    • 1
    Email author
  • M. Kameswara Rao
    • 1
  • P. Neelesh Kumar
    • 1
  1. 1.Department of Electronics & Computer EngineeringKLEFVaddeswaram, GunturIndia

Personalised recommendations