Advertisement

Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones

  • M. Arpitha
  • V. Geetha
  • K. H. Gowranga
  • R. Bhakthavathsalam
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 131)

Abstract

There is high demand to reduce the threat level in networks to ensure the data and services offered by them to be more secure. With the ever increasing number and diverse type of attacks, including new and previously unseen attacks, the effectiveness of an Intrusion Detection System is very important. Earlier works deal with the layered approach and conditional random fields (CRFs) for improving the efficiency and accuracy of an intrusion detection system. In this paper we developed an effective test suite using the layered CRFs. We set up different types of checks at multiple levels in each layer. Our framework examines various attributes at every layer in order to effectively identify any breach of security. Once the attack is detected, it is intimated through mobile phone to the system administrator for safe guarding the server system. We establish experimentally that the layered CRFs can be very effective in detecting intrusions when compared with the previously known techniques.

Keywords

Network security Intrusion detection Layered approach Conditional random fields Mobile phones 

Notes

Acknowledgments

The authors sincerely thank the authorities of Supercomputer Education and Research Center, Indian Institute of Science for the encouragement and support.

References

  1. 1.
    Scarfone K, Mell P (2007) Recommendations of the National Institute of Standards and Technology: intrusion detection systems basics. http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf
  2. 2.
    SANS Institute (2012) Intrusion detection FAQ. http://www.sans.org/resources/idfaq/
  3. 3.
    Gupta KK, Nath B, Kotagiri R (2010) Conditional random fields for intrusion detection. Proceedings of IEEE dependable and secure computingGoogle Scholar
  4. 4.
    Anderson JP (2010) Computer security threat monitoring and surveillance. http://csrc.nist.gov/publications/history/ande80.pdf
  5. 5.
    Agrawal R, Imielinski T, Swami A (1993) Mining association rules between sets of items in large databases. Proc ACM SIGMOD 22(2):207–216CrossRefGoogle Scholar
  6. 6.
    Gupta KK, Nath B, Kotagiri R (2006) Network security framework. Int J Comput Sci Netw Secur 6(7B):151–157Google Scholar
  7. 7.
    Gupta KK (2009) Robust and efficient intrusion detection systems. http://ww2.cs.mu.oz.au/ kgupta/files/phd-completion.pdf
  8. 8.
    Gupta KK, Nath B, Kotagiri R (2010) Layered approach using conditional random fields for intrusion detection. Proceedings of IEEE dependable and secure computingGoogle Scholar
  9. 9.
    Amor NB, Benferhat S, Elouedi Z (2004) Naive Bayes vs. decision trees in intrusion detection systems. In: Proceedings of ACM symposium on applied, computing (SAC’04), pp 420–424Google Scholar
  10. 10.
    Abraham T (2001) IDDM: intrusion detection using data mining techniques. http://www.dsto.defence./gov.au/publications/2345/DSTO-GD-0286.pdf
  11. 11.
    Gupta KK, Nath B, Kotagiri R (2010) Layered approach using conditional random fields for intrusion detection. IEEE Trans Depend Secure Comput 1(7):35–49CrossRefGoogle Scholar
  12. 12.
    Saravanan C, Shivsankar MV, Tamije Selvy P, Anto S (2012) An optimized feature selection for intrusion detection using layered conditional random fields with MAFS. Int J Mob Netw Commun Telematics 2(3):79–91CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • M. Arpitha
    • 1
  • V. Geetha
    • 1
  • K. H. Gowranga
    • 2
  • R. Bhakthavathsalam
    • 2
  1. 1.Department of Information Science and EngineeringAlpha College of EngineeringBangaloreIndia
  2. 2.Supercomputer Education and Research CenterIndian Institute of ScienceBangaloreIndia

Personalised recommendations