Abstract
The rapid growth of network-based information systems has resulted in continuous research of security issues. Intrusion Detection Systems (IDS) is an area of increasing concerns in the Internet community. Recently, a number of IDS schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems, are useful only for the existing patterns of intrusion. They can not detect new patterns of intrusion. Therefore, it is necessary to develop a new IDS technology that can find new patterns of intrusion. Most of IDS sensors provide less than 10% rate of false positives. In this paper, we proposed a new network-based probe detection model using the fuzzy cognitive maps that can detect intrusion by the Denial of Service (DoS) attack detection method utilizing the packet analyses. The probe detection systems using fuzzy cognitive maps (PDSuF) capture and analyze the packet information to detect SYN flooding attack. Using the results of the analysis of decision module, which adopts the fuzzy cognitive maps, the decision module measures the degree of risk of the DoS and trains the response module to deal with attacks. For the performance evaluation, the “IDS Evaluation Data Set” created by MIT was used. From the simulation we obtained the average true positive rate of 97.094% and the average false negative rate of 2.936%.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Gibson, S.: The Strange Tale of the Denial of Service Attacks Agent GRC.COM, http://grc.com/dos/grcdos.htm
Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security 6, 151–180 (1998)
Axelrod, R.: Structure of Decision: The Cognitive Maps of Political Elites. Princeton University Press, Princeton (1976)
Cannady, J.: Applying Neural Networks to Misuse Detection. In: Proceedings of the 21st National Information System Security Conference (1998)
Hongik Univ., STRC, Intrusion Detection System and Detection Rates Report, KISA (1999)
Lee, H.S., Im, Y.H.: Adaptive Intrusion Detection System Based on SVM and Clustering. Journal of Fuzzy Logic and Intelligent Systems 13(2), 237–242 (2003)
Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical Approaches to DDoS Attack Detection and Response. In: DARPA Information Survivability Conference and Exposition (2003)
Savage., S., Wetherall, D., Karlin, A.: Practical Network Support for IP Trace-back. In: Proceedings of ACM SIGCOMM (2000)
Garg, A., Narasimha, A.L.: Policy Based end Server Resource Regulation. IEEE/ACM Transactions on Networking 8(2), 146–157 (2000)
Ferguson, P., Sene, D.: Network Igress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. RFC 2827 (2000)
Lee, W., Stolfo, S.J.: A Framework for Constructing Features and Models for Intrusion Detection Systems. In: Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2000)
Chang, K.C.: Defending against Flooding-Based Distributed Denial of Service A Tutorial. IEEE Communications Magazine (2002)
Lee, S.Y.: An Adaptive Probe Detection Model using Fuzzy Cognitive Maps, Ph. D. Dissertation, Daejeon University (2003)
Solar: Designing and Attacking Port Scan Detection Tools. Phrack Magazine 8(53), 13–15 (1998)
Real-Time Scan Detector in real time networks, http://www.krcert.or.kr
Staniford, S., Hoagland, J.A., Mcalerney, J.M.: Practical Automated Detection of Stealthy Portscans., http://silicondefense.com/software/spice/index.htm
Schuba, C.L., Krsul, I.V., Kuhn, M.G.: Analysis of a Denial of Service Attack on TCP. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 208–223 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, SY., Kim, YS., Lee, BH., Kang, SH., Youn, CH. (2005). A Probe Detection Model Using the Analysis of the Fuzzy Cognitive Maps. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424758_34
Download citation
DOI: https://doi.org/10.1007/11424758_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25860-5
Online ISBN: 978-3-540-32043-2
eBook Packages: Computer ScienceComputer Science (R0)