Skip to main content

An Automated Framework to Uncover Malicious Traffic for University Campus Network

  • Conference paper
  • First Online:
Smart Trends in Computing and Communications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 165))

  • 687 Accesses

Abstract

The paper presents an automated framework that stimulates the campus network traffic to detect and prevent the malicious network activities and visualization of the logs using customized reporting dashboards on a real-time basis over the university campus network. The framework combines open source tools to give a realistic analysis of the network traffic using the detection and prevention engine. The detected malicious events by the engine are then processed by the elastic cluster for visualization of the threats. The framework measures the detection of the events and generates alerts, which shows that the engine performs better with elastic cluster which works on NoSQL for real-time incidence reporting. Once the system gets trained, the framework automatically blocks the attack as per the severity threat for further propagation in the future, over the network. This helps to secure and increase the performance of the campus networks using open source libraries and reduces the financial burdens due to commercial threat detection and prevention systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gaigole, M.S., et al.: The study of network security with its penetrating attacks and possible security mechanisms. Int. J. Comput. Sci. Mobile Comput. 4(5), 728–735 (2015)

    Google Scholar 

  2. Stanger, J.: Detecting intruders with Suricata. http://www.admin-magazine.com/Articles/Detecting-intruders-with-Suricata. Accessed 2018

  3. Kostrecová, E., Bínová, H.: Security information and event management. Paripex-Indian J. Res. 4(2) (2015)

    Google Scholar 

  4. Mohamed, A.B., Idris, N.B., Shanmugum, B.: A brief introduction to intrusion detection system. In: International Conference on Intelligent Robotics, Automation, and Manufacturing, CCIS 330, pp. 263–271 (2012)

    Google Scholar 

  5. Blumenthal: Intrusion-Prevention Systems and Enterprise Architecture, 29 Jan 2008. http://www.andyblumenthal.com/2008_01_01_archive.html. Accessed 2018

  6. Waagsnes, H.: SCADA intrusion detection system test framework. Master’s thesis, Department of Information and Communication Technology, Faculty of Engineering and Science University of Agder Grimstad, 21 May 2017

    Google Scholar 

  7. Waagsnes, H., Ulltveit-Moe, N.: Intrusion detection system test framework for SCADA Systems. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), pp. 275–285. https://doi.org/10.5220/0006588202750285

  8. Saif, A.: IDPS—Intrusion Detection Prevention Systems, COURSE TITLE CSCE 522. https://www.coursehero.com/file/14996872/IDPS/. Accessed 2018

  9. Ish, J., Jaentsch, K.: py-idstools: Snort and Suricata rule and event utilities in python. https://github.com/jasonish/py-idstools (2013). Accessed 2018

  10. Khamphakdee, N., Benjamas, N., Saiyod, S.: Improving intrusion detection system based on snort rules for network probe attack detection. In: 2014 2nd International Conference on Information and Communication Technology (ICoICT), Bandung, pp. 69–74 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Mahajan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mahajan, A., Ramotra, A.K., Mansotra, V., Singh, M. (2020). An Automated Framework to Uncover Malicious Traffic for University Campus Network. In: Zhang, YD., Mandal, J., So-In, C., Thakur, N. (eds) Smart Trends in Computing and Communications. Smart Innovation, Systems and Technologies, vol 165. Springer, Singapore. https://doi.org/10.1007/978-981-15-0077-0_11

Download citation

Publish with us

Policies and ethics