ANALYSIS OF INTELLIGENT COMPUTER NETWORK TRAFFIC MONITORING SYSTEMS FOR INTRUSION DETECTION SYSTEMS

Authors

DOI:

https://doi.org/10.32782/IT/2023-1-11

Keywords:

intelligent monitoring, network traffic, intrusion detection system, cybersecurity, machine learning, traffic analysis, traffic anomalies, intrusion detection system classification, network threats

Abstract

The article deals with the information technology of intelligent monitoring of computer network traffic for intrusion detection systems. The article provides an overview of modern systems for traffic monitoring, anomaly detection, and attack detection of various types. The use of machine learning for traffic analysis and the development of modern algorithms are analyzed. The classification of intrusion detection systems by the main parameters and capabilities of traffic analysis is considered, and a table comparing different types of intrusion detection systems with their advantages and disadvantages is presented. The possible network threats that can be detected by intelligent monitoring of computer network traffic are investigated, and the prospects for using intelligent monitoring to improve attack detection systems are determined.

References

Vern Paxson. "Bro: A System for Detecting Network Intruders in Real-Time." Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998. doi: 10.1016/S1389-1286(99)00112-7

Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi. "EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis." Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011.

Alina Oprea, Zhou Li, Ting-Fang Yen, Sang Chin, Sumayah Alrwais. "Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data." Conference: 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). doi: 10.1109/DSN.2015.14

Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai. "Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection." Conference: Network and Distributed System Security Symposium. January 2018. doi: 10.14722/ndss.2018.23211

N. Šrndić and P. Laskov, "Practical Evasion of a Learning-Based Classifier: A Case Study," 2014 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2014, pp. 197-211, doi: 10.1109/SP.2014.20.

Ida Seraphim, Shreya Palit, Kaustubh Srivastava, Poovammal Eswaran. A Survey on Machine Learning Techniques in Network Intrusion Detection System, Conference: 2018 4th International Conference on Computing Communication and Automation (ICCCA), doi: 10.1109/CCAA.2018.8777596.

G. Shang-fu and Z. Chun-lan, "Intrusion detection system based on classification," 2012 IEEE

International Conference on Intelligent Control, Automatic Detection and High-End Equipment, Beijing, China, 2012, pp. 78-83, doi: 10.1109/ICADE.2012.6330103.

M. O. Miah, S. Shahriar Khan, S. Shatabda and D. M. Farid, "Improving Detection Accuracy for Imbalanced Network Intrusion Classification using Cluster-based Under-sampling with Random Forests," 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), Dhaka, Bangladesh, 2019, pp. 1-5, doi: 10.1109/ICASERT.2019.8934495.

N. S. Bhati and M. Khari, "Comparative Analysis of Classification Based Intrusion Detection Techniques," 2021 5th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2021, pp. 1-6, doi: 10.1109/ISCON52037.2021.9702411.

G. Sah and S. Banerjee, "Feature Reduction and Classifications Techniques for Intrusion Detection System," 2020 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 2020, pp. 1543-1547, doi: 10.1109/ICCSP48568.2020.9182216.

A. S. Subaira and P. Anitha, "Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey," 2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, 2014, pp. 274-280, doi: 10.1109/ISCO.2014.7103959.

R. Samrin and D. Vasumathi, "Review on anomaly based network intrusion detection system," 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), Mysuru, India, 2017, pp. 141-147, doi: 10.1109/ICEECCOT.2017.8284655.

Rushendra, K. Ramli, N. Hayati, E. Ihsanto, T. S. Gunawan and A. H. Halbouni, "Development of Intrusion Detection System using Residual Feedforward Neural Network Algorithm," 2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Yogyakarta, Indonesia, 2021, pp. 539-543, doi: 10.1109/ISRITI54043.2021.9702773.

Published

2023-06-20