Algorithm to detect intrusions using multi layer signature based model

The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. In recent years, intrusion detection system (IDS) had been developed as a...

Full description

Saved in:
Bibliographic Details
Main Authors: Uddin, Mueen, Abdul Rahman, Azizah, Memon, J. Amshed, Uddin, Naeem
Format: Article
Published: 2012
Subjects:
Online Access:http://eprints.utm.my/id/eprint/46572/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. In recent years, intrusion detection system (IDS) had been developed as a new approach system to defend networking systems, which properly combines the firewall technique with the intrusion detection. These systems try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network.In this context, signature-based network intrusion detection techniques are a valuable technology to protect target systems and networks against malicious activities.Signature based detection is the most extensively used threat detection technique for Intrusion Detection Systems (IDS). One of the foremost challenges for signature-based IDS systems is how to keep up with large volume of incoming traffic when each packet needs to be compared with every signature in the database. When an IDS cannot keep up with the traffic flood, all it can do is to drop packets, therefore, may miss potential attacks. This paper proposes a new model called Dynamic Multi-Layer Signature based IDS using Mobile Agents, which can detect imminent threats with very high success rate by dynamically and automatically creating and using small and efficient multiple databases, and at the same time, provide mechanism to update these small signature databases at regular intervals using Mobile Agents.