Design and Simulation of a Tree-Based Intrusion Detection System against Denial of Service

Article Preview

Abstract:

Based on analysis of relative and absolute traffic anomalies a fully DIDS(Distributed Intrusion Detection System) is built to detect and respond flooding DoS(Denial of Service) in a specific network area, using traffic trees as data structure to store, execute, communicate and combine abnormal data. A single component settled in a network element is called Tree-Devices and all Tree-Devices construct a Tree-DIDS, a fully DIDS. Tree-Devices communicate with other devices in three ways and collaborate to detect attacks, by which communication cost is reduced. Fully architecture avoids the single point failure, while double anomalies help to warn earlier. The simulation results and performance analysis show that Tree-DIDS works effectively.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

790-795

Citation:

Online since:

August 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] D. Novikov, R. Yampolskiy, and L Reznik: Anomaly Detection Based Intrusion Detection. Third International Conference on Information Technology(2006), pp.420-425.

DOI: 10.1109/itng.2006.33

Google Scholar

[2] H. Kai, H. Zhu, K. Eguchi, N. Sun, and T. Tabata: A �ovel Intelligent Intrusion Detection, Decision, Response System (IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences archive, 2006).

DOI: 10.1093/ietfec/e89-a.6.1630

Google Scholar

[3] Wei Lin, Liu Xiang, Derek Pao, and Bin Liu: Collaborative Distributed Intrusion Detection System. Second International Conference on Future Generation Communication and Networking (2008), pp.172-177.

DOI: 10.1109/fgcn.2008.67

Google Scholar

[4] Martin Chovanec, Liberios Vokorkos, and Ján Perháč: Security Architecture Based on Multilayer Distributed Intrusion Detection System. 5th International Symposium on Applied Computational Intelligence and Informatics (2009), pp.301-306.

DOI: 10.1109/saci.2009.5136261

Google Scholar

[5] M. Yasin, and A. Awan: A Study of Host-Based IDS using System Calls. International Conference on Networking and Communication (2004), pp.36-41.

DOI: 10.1109/incc.2004.1366573

Google Scholar

[6] Safaa Zaman and Fakhri Karray: Collaborative Architecture for Distributed Intrusion Detection System. Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications (2009), pp.1-7.

DOI: 10.1109/cisda.2009.5356567

Google Scholar