Analysis of Methods of Attack Detection and Prevention Systems


Download 0.59 Mb.
bet6/6
Sana28.02.2023
Hajmi0.59 Mb.
#1236425
1   2   3   4   5   6
Bog'liq
Paper Tashev 2022

Categories

Criteria

System monitoring level

Verifiability

Adaptability

Sustanability

Load controlled environment

False positive

False negative

Complexity

Methods

1

Signature analysis

Host, Network, application

+

-

Global

Low

Average

Low

O(logn)



2

Statistical analysis

Host, Network

-

+

Local

Average

High

High

O(n)

Integrity Control

Host

+

-

Global

Average

High

High

O(n)

Attack scenario graphs

Host, Network, application

+

+

Local

Average

High

High

NP



Expert systems

Host, Network

+

+

Global

Average

High

High

NP



Neural networks

Host, Network, application

+

+

Local

Average

High

High

O(n)



Immune networks

Host, Network

-

+

Local

Average

High

High

O(n)



Cluster analysis

Host, Network, application

-

+

Local

Average

High

High

O(n)



Behavioral biometrics

Host

-

+

Local

Average

High

High

O(n)



3

Specification Based Methods

Network

+

-

Local

Low

Low

Average

O(logn)



Analysis of system states

Host, Network, application

+

-

Local

Low

Low

Average

O(n)


V. CONCLUSION


Today NIDS is an integral part of the complex system for protecting information and communication networks. The development of intrusion detection technologies should not be limited to the application level, but should also go further along the line of development at the hardware level too. Currently, hardware implementation technologies that perform the functions of protecting the information and communication system are developing very rapidly.
References




  1. Yang B., Wang X. ,Xue Y., and Li J., 2009,”DBS: A Bit-level Heuristic Packet Classification Algorithm for High Speed Network ”, In Proceeding of the 15th IEEE International Conference on Parallel and Distributed System (ICPADS), pp. 260-267.

  2. Snort: the de facto standard for intrusion detection/prevention. http://www.snort.org.

  3. T. AbuHmed, A. Mohaisen, and D. Nyang, “A survey on deep packet inspection for intrusion detection systems,” CoRR, vol. abs/0803.0037, 2008. [Online]. Available: http://arxiv.org/abs/0803.0037. 2015.

  4. Koloud Al-Khamaiseh, Shadi ALShagarin. A Survey of String Matching Algorithms. Int. Journal of Engineering Research and Applications. ISSN : 2248-9622, Vol. 4, Issue 7(Version 2), July 2014, pp.144-156.

  5. L7-filter. http://l7-filter.sourceforge.net/. 01.12.2015.

  6. J. E. Hopcroft and J. D. Ullman, “Introduction to Automata Theory, Languages, and Computation,” Addison Wesley, 1979.

  7. Cascarano N, Ciminiera L, Risso F. Optimizing deep packet inspection for high-speed traffic analysis. Network System Manager. 2011; 19(1):7–31.

  8. A.I.Getman, E.F.Yevstropov and Yu.V. Markin. Analyzing of network traffic in real time mode. 2015. Internet resource: https://www.ispras.ru/preprints/docs/prep_28_2015.pdf

  9. A Hardware Platform for Network Intrusion Detection and Prevention. http://www.cc.gatech.edu/home/wenke/papers/np3.pdf,

  10. P. Bosshart, D. Daly, G. Gibb, M. Izzard, N. McKeown, J. Rexford, C. Schlesinger, D. Talayco, A. Vahdat, G. Varghese, D. Walker. P4: Programming protocol-independent packet processors. SIGCOMM Computer Communications Review, 2013

  11. Linley Gwennap, The basics of network processors. https://www.embedded.com/design/prototyping-and-development/4025000/The-basics-of-network-processors.

  12. A.X.Nishanov, E.Avazov, B.Akbaraliev. Partial selection method and algorithm for determining graph-based traffic routes in a real-time environment. International Journal of Innovative Technology and Exploring Engineering. Volume 8, Issue 6, April 2019, Pages 697

  13. S.R.Gulomov, A.A.Ganiev. Methods and models of protecting computer networks from unwanted network traffic. International Journal of Engineering and Technology(UAE). Volume 7, Issue 4, 2018, Pages 2541-2545

  14. M.M.Kamilov, A.X.Nishanov, R.J.Beglerbekov. Modified stages of algorithms for computing estimates in the space of informative features. International Journal of Innovative Technology and Exploring Engineering. Volume 8, Issue 6, April 2019, Pages 714-717

  15. J. Bispo, I. Sourdis, J. Cardoso, S. Vassiliadis, “Synthesis of Regular Expressions Targeting FPGAs: Current Status and Open Issues”, in Proc. of the 3rd international conference on Reconfigurable computing: architectures, tools and applications, ARC 2007, Springer-Verlag.

  16. R. Sidhu and V.K. Prasanna, “Fast Regular Expression Matching Using FPGAs,” in Proc. of the 9th IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2001, pp. 227 - 238.

  17. Y.H.E. Yang, W Jiang, V.K. Prasanna, “Compact architecture for highthroughput regular expression matching on FPGA”, in Proc. of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2008, pp. 30–39.

  18. N. Yamagaki, R. Sidhu, S. Kamiya “High-speed regular expression matching engine using multi-character NFA”, in Proc. of International Conference on Field Programmable Logic and Applications, FPL 2008, pp. 131-136.

  19. Z. K. Baker, V. K. Prasanna, “Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs”, IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 289-300, Oct.-Dec. 2006. [15] M. Attig, J. Lockwood, “SIFT: Snort Intrusion Filter for TCP”, HOTI, Proceedings of the 13th Symposium on High Performance Interconnects.

  20. I. Sourdis, D. N. Pnevmatikatos, S. Vassiliadis, “Scalable Multigigabit Pattern Matching for Packet Inspection”, IEEE Transaction on VLSI Systems Vol. 16, no. 2, pp. 156-166, 2008.

  21. C. R. Clark and D. E. Schimmel, “Scalable parallel pattern-matching on high-speed networks,” in Proc. of IEEE Symposium on Field Programmable Custom Computing Machines, FCCM 2004, pp. 249-257.

  22. I. Sourdis, D. Pnevmatikatos, “Fast, large-scale string match for a 10gbps FPGA-based network intrusion detection system”, in Proc. of International Conference on Field Programmable Logic and Applications, FPL 2003, pp. 880-889.

  23. I. Sourdis, D. Pnevmatikatos, S. Wong, and S. Vassiliadis, “A reconfigurable perfect-hashing scheme for packet inspection” in Proc. of the 15th Int. Conf. Field Programmable Logic Application, FPL 2005, pp. 644-647.

  24. M. Attig, S. Dharmapurikar, and J. Lockwood, “Implementation results of bloom filters for string matching” in Proc. of IEEE Symp. on FieldProgrammable Custom Computing Machine, FCCM 2004, pp. 322-323.

  25. W.Jiang, V.Prasanna. Field-split parallel architecture for high performance multi-match packet classification using FPGAs. SPAA 2009: Proceedings of the 21st Annual ACM Symposium on Parallelism in Algorithms and Architectures, Calgary, Alberta, Canada, August 11-13, 2009

  26. M. Karimov, K. Tashev and S. Rustamova, "Application of the Aho-Corasick algorithm to create a network intrusion detection system," 2020 International Conference on Information Science and Communications Technologies (ICISCT), 2020, pp. 1-5, doi: 10.1109/ICISCT50599.2020.9351435.

  27. D. Irgasheva, "On the Basic Method for Solving the Problem of Synthesizing Access Control Systems," 2020 International Conference on Information Science and Communications Technologies (ICISCT), 2020, pp. 1-4, doi: 10.1109/ICISCT50599.2020.9351444.

  28. K. Tashev and S. Rustamova, "Analysis of Subject Recognition Algorithms based on Neural Networks," 2020 International Conference on Information Science and Communications Technologies (ICISCT), 2020, pp. 1-4, doi: 10.1109/ICISCT50599.2020.9351414.

  29. M. Z. Yakubova, O. A. Manankova, K. A. Tashev and G. S. Sadikova, "Methodology of the Determining for Pearson's Criterion based on Researching the Value of Delays in the Transmitting of Information over a Multiservice Network," 2020 International Conference on Information Science and Communications Technologies (ICISCT), 2020, pp. 1-5, doi: 10.1109/ICISCT50599.2020.9351419.

  30. I. Durdona Yakubdjanovna, N. Nurbek Bakhtiyarovich and X. lqbol Ubaydullayevna, "Implementation of intercorporate correlation of information security messages and audits," 2020 International Conference on Information Science and Communications Technologies (ICISCT), 2020, pp. 1-4, doi: 10.1109/ICISCT50599.2020.9351470.







Komil Tashev
2022.Vol-3(11)

Download 0.59 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling