Detection of Masquerade Attacks using Data-Driven Semi-Global Alignment Approach

B.S.R.D Lakshmi, K. L Ganapathi Reddy

Abstract


The broad utilization of virtualization in representing security basis conveys unrivaled security worries for inhabitants or clients and presents an extra layer that itself must be totally arranged and secured. Gatecrashers can abuse the extensive measure of assets for their attacks. This venture talks about two methodologies .In the initial three elements to be specific continuous attacks, autonomic counteractive action activities and hazard measure are incorporated to our Autonomic Intrusion Detection Framework (AIDF) as the majority of the present security advancements don't give the fundamental security components to frameworks, for example, early notices about future progressing attacks, autonomic avoidance activities and hazard measure. Accordingly, the controller can take proactive restorative activities before the attacks represent a genuine security hazard to the framework. In another Attack Sequence Detection (ASD) approach as assignments from various clients might be performed on a similar machine. In this way, one essential security concern is whether client information is secure in. Then again, programmer may encourage processing to dispatch bigger scope of attack. For example, a demand of port output in with numerous virtual machines executing such vindictive activity. In, for instance, avoiding a simple to adventure machine and afterward utilizing the past traded off to attack the objective. Such attack plan might be stealthy or inside the registering condition. So intrusion detection framework or firewall experiences issues to recognize it.


Keywords


DDoS attack, low-rate attacks, Security Testing, intrusion detection, DDSGA.

References


M. Schonlau, W. DuMouchel, W. Ju, A. F. Karr, M. Theus, and Y.Vardi, “Computer intrusion: Detecting masquerades,†Statist. Sci.vol. 16, no. 1, pp. 58–74, 2001.

S. E. Coull, J. W. Branch, B. K. Szymanski, and E. A. Breimer, “Intrusion detection: A bioinformatics approach,†in Proc. 19th Annu. Comput. Security Appl. Conf., Las Vegas, NV, USA, Dec.2003, pp. 24–33

A. H. Phyo and S. M. Furnell. “A detection-oriented classification of insider it misuses,†in Proc. 3rd Security Conf. 2004.

S. K. Dash, K. S. Reddy, and A. K., Pujar“Episode based masquerade detection,†i,in Proc. 1st Int. Conf. Inf. Syst. Security, 2005,

A. Sharma and K. K. Paliwal, “Detecting masquerades using a combination of Na€ıve Bayes and weighted RBF approach,†J. Comput.Virology, vol. 3, no. 3, pp, 237– 245, 2007.

Scott E. Coull, Boleslaw K. Szymanski, “Sequence alignment for masquerade detection†Computational Statistics and Data Analysis 52 (2008) 4116–4131

S. Malek and S. Salvatore, “Detecting masqueraders: A comparison of one-class bag-of-words user behavior modellingâ€.

A. S. Sodiya, O. Folorunso, S. A. Onashoga, and P. O. Ogundeyi, “An improved semi-global alignment algorithm for masquerade detection,†Int. J. Netw. Security, vo1. 12, no. 3, pp. 211–220, May 2011.

Hisham A. Kholidy, Fabrizio Baiardi, and Salim Hariri DDSGA: data-driven semi-global alignment approach for detecting masquerade attack.

[5] W. Lee and S. J. Stolfo, “A framework for constructing features and models for intrusion detection systems,†ACM Trans.Inf. Syst. Secur., vol. 3, no. 4, pp. 227–261, Nov. 2000.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â