Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones
There is high demand to reduce the threat level in networks to ensure the data and services offered by them to be more secure. With the ever increasing number and diverse type of attacks, including new and previously unseen attacks, the effectiveness of an Intrusion Detection System is very important. Earlier works deal with the layered approach and conditional random fields (CRFs) for improving the efficiency and accuracy of an intrusion detection system. In this paper we developed an effective test suite using the layered CRFs. We set up different types of checks at multiple levels in each layer. Our framework examines various attributes at every layer in order to effectively identify any breach of security. Once the attack is detected, it is intimated through mobile phone to the system administrator for safe guarding the server system. We establish experimentally that the layered CRFs can be very effective in detecting intrusions when compared with the previously known techniques.
KeywordsNetwork security Intrusion detection Layered approach Conditional random fields Mobile phones
The authors sincerely thank the authorities of Supercomputer Education and Research Center, Indian Institute of Science for the encouragement and support.
- 1.Scarfone K, Mell P (2007) Recommendations of the National Institute of Standards and Technology: intrusion detection systems basics. http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf
- 2.SANS Institute (2012) Intrusion detection FAQ. http://www.sans.org/resources/idfaq/
- 3.Gupta KK, Nath B, Kotagiri R (2010) Conditional random fields for intrusion detection. Proceedings of IEEE dependable and secure computingGoogle Scholar
- 4.Anderson JP (2010) Computer security threat monitoring and surveillance. http://csrc.nist.gov/publications/history/ande80.pdf
- 6.Gupta KK, Nath B, Kotagiri R (2006) Network security framework. Int J Comput Sci Netw Secur 6(7B):151–157Google Scholar
- 7.Gupta KK (2009) Robust and efficient intrusion detection systems. http://ww2.cs.mu.oz.au/ kgupta/files/phd-completion.pdf
- 8.Gupta KK, Nath B, Kotagiri R (2010) Layered approach using conditional random fields for intrusion detection. Proceedings of IEEE dependable and secure computingGoogle Scholar
- 9.Amor NB, Benferhat S, Elouedi Z (2004) Naive Bayes vs. decision trees in intrusion detection systems. In: Proceedings of ACM symposium on applied, computing (SAC’04), pp 420–424Google Scholar
- 10.Abraham T (2001) IDDM: intrusion detection using data mining techniques. http://www.dsto.defence./gov.au/publications/2345/DSTO-GD-0286.pdf