PROIDS: Probabilistic Data Structure Based Intrusion Detection System
PROIDS: Probabilistic Data Structure Based Intrusion Detection System
Presented by
Ms. Aditi Anil Adhav
OUTLINES:
Introduction to the Domain
Details of technology
Experimental Work
2
References
Introduction To The Domain:
With the advancements in information technology, networks are widely used in a
variety of markets. Hence, its security cannot be negotiated.
The most important way for monitoring and analyzing network traffic against
various attacks is by the deployment of Intrusion detection systems (IDS).
The domain introduces IDS based on probabilistic data structures named as ProIDS.
In the proposed ProIDS, a popular probabilistic data structure (PDS), Bloom filter
has been used to store the information about the suspicious nodes.
3
Objective and Motivation:
Objective:
To provide intrusion detection for preventing network from malicious contents.
To provide an IDS with more storage capacity and with less computational
time.
Motivation:
Increasing number of network attacks.
For addressing the issue of memory requirement and computational cost using
efficient data structures.
4
Literature Review (Existing Methods) :
Some existing network based systems are:
NSM (Network Security Monitor; Axelsson, 1999),
NetSTAT (Vigna & Kemmerer, 1999),
Bro (Axelsson, 1999).
One challenge that the existing network-based intrusion detection is facing is the
speed of high performance networks.
The high-performance networks makes it very difficult to capture the network traffic.
5
Details of technology:
The proposed system introduces a technique of malicious detection, i.e.,
Probabilistic data structures based IDS (ProIDS).
Bloom filter is used to store data of suspicious node to improve the performance of
membership testing phase.
For monitoring and analyzing the network traffic, modified count min sketch is
proposed which results in low false positive ratio in comparison to the CMS.
6
Experimental Work :
7
Experimental Work (Contd.):
Monitoring Network Traffic:
In network monitoring task following steps are followed to detect suspects:
Membership testing
8
Advantages:
Do not consume the resources of the computers that are being protected.
9
Disadvantages:
System may fail to recognize an attack launched during periods of high traffic.
10
Conclusion and Future Scope
Conclusion:
As there is a growing need for analyzing the network traffic efficiently for
detecting and preventing malicious activities, a novel malicious detection
technique must be provided.
Hence, the ProIDS achieves high accuracy with low false positive rate.
Future Scope:
A system to deploy the proposed ProIDS model for the detection of malicious
events in streaming data.
11
References
[1] A. Abduvaliyev, A.-S. K. Pathan, J. Zhou, R. Roman, and W.-C. Wong, “On the vital areas of intrusion detection
systems in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 1223–1237,
2013.
[2] I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE
Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266–282, 2014.
[3] A. A. Aburomman and M. B. I. Reaz, “A survey of intrusion detection systems based on ensemble and hybrid
classifiers,” Computers & Security, vol. 65, pp. 135–152, 2017.
[4] S. Geravand and M. Ahmadi, “Bloom filter applications in network security: A state-of-the-art survey,” Computer
Networks, vol. 57, no. 18, pp. 4047–4064, 2013.
[5] M. Aldwairi and K. Al-Khamaiseh, “Exhaust: Optimizing Wu-Manber pattern matching for intrusion detection using
bloom filters,” in Web Applications and Networking (WSWAN), 2015 2nd World Symposium on. IEEE, 2015, pp. 1–
6.
12
Thank You!
13