SlideShare a Scribd company logo
1 of 6
Download to read offline
CYBERSECuRITY




          Intrusion Detection
          for Grid and Cloud
          Computing
          Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall,
          Federal University of Santa Catarina, Brazil



          Providing security in a distributed system requires more than user
          authentication with passwords or digital certificates and confidentiality
          in data transmission. The Grid and Cloud Computing Intrusion Detection
          System integrates knowledge and behavior analysis to detect intrusions.



          B
                     ecause of their distributed nature,                  usually provides these features, so we propose an
                     grid and cloud computing environ-                    IDS service offered at the middleware layer (as
                     ments are easy targets for intruders                 opposed to the infrastructure or software layers).
                     looking for possible vulnerabilities to                 An attack against a cloud computing system
          exploit. By impersonating legitimate users, the                 can be silent for a network-based IDS deployed in
          intruders can use a service’s abundant resources                its environment, because node communication
          maliciously.                                                    is usually encrypted. Attacks can also be invisi-
             To combat attackers, intrusion-detection sys-                ble to host-based IDSs, because cloud-specific
          tems (IDSs) can offer additional security mea-                  attacks don’t necessarily leave traces in a node’s
          sures for these environments by investigating                   operating system, where the host-based IDS re-
          configurations, logs, network traffic, and user                 sides. In this way, traditional IDSs can’t appro-
          actions to identify typical attack behavior.1 How-              priately identify suspicious activities in a grid and
          ever, an IDS must be distributed to work in a grid              cloud environment3 (see the “Related Work in
          and cloud computing environment. It must mon-                   Intrusion Detection” sidebar).
          itor each node and, when an attack occurs, alert                   Here, we take a careful look at the cloud
          other nodes in the environment. This kind of                    case in particular. We propose the Grid and
          communication requires compatibility between                    Cloud Computing Intrusion Detection System
          heterogeneous hosts, various communication                      (GCCIDS), which has an audit system designed to
          mechanisms, and permission control over system                  cover attacks that network- and host-based sys-
          maintenance and updates—typical features in                     tems can’t detect. GCCIDS integrates knowledge
          grid and cloud environments.2 Cloud middleware                  and behavior analysis to detect specific intrusions.


38	    IT Pro		July/August	2010	                  Published by the IEEE Computer Society	        1520-9202/10/$26.00 © 2010 IEEE
Related Work in Intrusion Detection

    H    ere we present some of the relevant research on
         intrusion detection for grids, discussing in par-
    ticular the techniques they apply and the source of
                                                                 they apply behavior-based techniques in the analy-
                                                                 sis. In comparison, we conclude that the available
                                                                 solutions approach the problem in a different way,
    the data they analyze.                                       especially in regards to the threats we try to de-
       Table A classifies related work according to the audit    fend against by combining two distinct auditing
    data source (host, network, or grid), the analysis tech-     techniques.
    nique (knowledge- or behavior-based), and if there
    was a proper evaluation. Fang-Yie Leu, Jia-Chun Lin,         References
    Ming-Chang Li, Chao-Tung Yang, and Po-Chi Shih’s              1. F-Y. Leu et al., “Integrating Grid with Intrusion Detection,”
    work,1 along with Stuart Kenny and Brian Coghlan’s2              Proc. Int’l Conf. Advanced Information Networking and
    solutions, are based on analyzing data from a grid’s             Applications (AINA 05), vol. 1, IEEE CS Press, 2005,
    network, although these approaches can’t detect                  pp. 304–309.
    grid-specific attacks, because they don’t capture any         2. S. Kenny and B. Coghlan, “Towards a Grid-Wide
    high-level data. Guofu Feng, Xiaoshe Dong, Weizhe                Intrusion Detection System,” Proc. European Grid Conf.
    Liu, Ying Chu, and Junyang Li integrate a host-based             (EGC 05), Springer, 2005, pp. 275–284.
    intrusion-detection system (IDS) into a grid environ-         3. G. Feng et al., “GHIDS: Defending Computational Grids
    ment, providing protection against typical operating             against Misusing of Shared Resource,” Proc. Asia-Pacific
    system attacks, but not the ones that might target               Conf. Services Computing (APSCC 06), IEEE CS Press,
    middleware vulnerabilities.3                                     2006, pp. 526–533.
       Mohamed Tolba 4 and Alexandre Schulter5 and                4. M. Tolba et al., “Distributed Intrusion Detection System
    their colleagues view a computational grid as one                for Computational Grids,” Proc. 2nd Int’l Conf. Intelligent
    big host of resources, and the audit data is collected           Computing and Information Systems (ICICIS 05), 2005.
    from the operating systems as in typical host-based           5. A. Schulter et al., “Intrusion Detection for Computational
    IDSs. Their solutions focus on analyzing high-level              Grids,” Proc. 2nd Int’l Conf. New Technologies, Mobility,
    information regarding grid usage by its users, and               and Security, IEEE Press, 2008, pp. 1–5.



      Table A. Features of related works concerning intrusion detection for grids.
                                                                         Knowledge-          Behavior-
                     Host-based        Network-        Data from         based               based
      Author         IDS               based IDS       a grid            technique           technique         Validation

      Tolba               Yes              No              Yes                No                 Yes                Yes
      Schulter            Yes              Yes             No                 No                 Yes                Yes
      Choon               No               Yes             N/A                No                 No                 No
      Kenny               No               Yes             No                 Yes                No                 Yes
      Leu                 No               Yes             No                 Yes                No                 Yes
      Feng                Yes              No              No                 Yes                No                 Yes




Our Proposed Service                                       policies and suppor ts a ser vice-oriented
In our solution, each node identifies local events         environment.
that could represent security violations and alerts          The service provides its functionality in the
the other nodes. Each individual IDS coopera-              environment through the middleware, which
tively participates in intrusion detection. Figure 1       facilitates communication.
depicts the sharing of information between the               The event auditor is the key piece in the sys-
IDS service and the other elements participating           tem. It captures data from various sources,
in the architecture: the node, service, event audi-        such as the log system, service, and node mes-
tor, and storage service.                                  sages. The IDS service analyzes this data and
   The node contains the resources, which are              applies detection techniques based on user be-
accessed homogeneously through the middle-                 havior and knowledge of previous attacks. If it
ware. The middleware sets the access-control               detects an intrusion, it uses the middleware’s


	                                                                                                       computer.org/ITPro           39
CYBERSECuRIT Y

             Grid node                                                           Grid node
                               Service                                                             Service
                                                                                                                  known trails left by attacks or certain
                         IDS service                                                         IDS service
                                                                                                                  sequences of actions from a user who
         Event auditor




                                                                             Event auditor
                              Analyzer                                                            Analyzer
                                                                                                                  might represent an attack.
                            Alert system                                                        Alert system
                                                                                                                     The audited data is sent to the IDS
                         Storage service                                                     Storage service
                                                                                                                  service core, which analyzes the be-
                                                                                                                  havior using artificial intelligence to
                                                                                                                  detect deviations. The analyzer uses
                         Knowledge Behavior                                                  Knowledge Behavior   a profile history database to deter-
                           base     base                                                       base     base
                                                                                                                  mine the distance between a typical
                                                                                                                  user behavior and the suspect behav-
                                                                                                                  ior and communicates this to the IDS
                                               Grid node                                                          service.
                                                                 Service
                                                                                                                     The rules analyzer receives audit
                                                                                                                  packages and determines whether a
                                                           IDS service
                                                                                                                  rule in the database is being broken.
                                           Event auditor




                                                                Analyzer
                                                                                                                  It returns the result to the IDS service
                                                              Alert system
                                                                                                                  core. With these responses, the IDS
                                                           Storage service                                        calculates the probability that the ac-
                                                                                                                  tion represents an attack and alerts
                                                                                                                  the other nodes if the probability is
                                                           Knowledge Behavior
                                                                                                                  sufficiently high.
                                                             base     base

                                                                                 Event Auditor
                                                             Alert system        To detect an intrusion, we need
                                      Synchronize                                audit data describing the environ-
                                      Communication service                      ment’s state and the messages being
                                      Service
                                                                                 exchanged. The event auditor can
                                                                                 monitor the data that the analyzers
                                      Database                                   are accessing. The first component
                                                                                 monitors message exchange between
                                                                                 nodes. Although audit information
      Figure 1. The architecture of grid and cloud computing intrusion           about the communication between
      detection. Each node identifies local events that could represent          nodes is being captured, no network
      security violations and sends an alert to the other nodes.                 data is taken into account—only
                                                                                 node information.
               communication mechanisms to send alerts                 The second component monitors the middle-
               to the other nodes. The middleware synchro-          ware logging system. For each action occurring
               nizes the known-attacks and user-behavior            in a node, a log entry is created containing the
               databases.                                           action’s type (such as error, alert, or warning), the
                 The storage service holds the data that the IDS    event that generated it, and the message. With
               service must analyze. It’s important for all nodes   this kind of data, it’s possible to identify an ongo-
               to have access to the same data, so the middle-      ing intrusion.
               ware must transparently create a virtualization of
               the homogeneous environment.                         Behavior Analysis
                                                                    Numerous methods exist for behavior-based
               IDS Service                                          intrusion detection, such as data mining, ar-
               The IDS service increases a cloud’s security         tificial neural networks, and artificial immu-
               level by applying two methods of intrusion           nological systems. We use a feed-for ward
               detection. The behavior-based method dictates        artificial neural network, because—in contrast
               how to compare recent user actions to the usual      to traditional methods—this type of network can
               behavior. The knowledge-based method detects         quickly process information, has self-learning


40	              IT Pro		July/August	2010
capabilities, and can tolerate small behavior          Results
deviations. These features help overcome some          We developed a prototype to evaluate the pro-
IDS limitations.4                                      posed architecture using Grid-M, a middleware
  Using this method, we need to recognize ex-          of our research group developed at the Federal
pected behavior (legitimate use) or a severe be-       University of Santa Catarina.5
havior deviation. Training plays a key role in the        We created data tables to perform the experi-
pattern recognition that feed-forward networks         ments with audit elements coming from both the
perform. The network must be correctly trained         log system and from data captured during node
to efficiently detect intrusions. For a given intru-   communications. We prepared three types of
sion sample set, the network learns to identify the    simulation data to test.
intrusions using its retropropagation algorithm.          First, we created data representing legitimate
However, we focus on identifying user behav-           action by executing a set of known services simu-
ioral patterns and deviations from such patterns.      lating a regular behavior.
With this strategy, we can cover a wider range of         Then, we created data representing behavior
unknown attacks.                                       anomalies. To represent anomalous sequences
                                                       of actions, we altered the services and their us-
Knowledge Analysis                                     age frequency. For example, for a teaching depart-
Knowledge-based intrusion detection is the             ment that posts grades electronically, if two out of
most often applied technique in the field be-          every 100 grades are typically corrected later be-
cause it results in a low false-alarm rate and high    cause of a mistake, then an anomalous behavior
positive rates, although it can’t detect unknown       would be correcting 10 consecutive grades. This
attack patterns. It uses rules (also called signa-     action would deserve special attention to deter-
tures) and monitors a stream of events to find         mine whether it constituted an abuse of privileges.
malicious characteristics.                                Finally, we created data representing policy
  Using an expert system, we can describe a            violation. This was prepared with a set of audit
malicious behavior with a rule. One advantage          packages containing a series of elements violat-
of using this kind of intrusion detection is that      ing base rules.
we can add new rules without modifying exist-
ing ones.                                              Evaluating the Event Auditor
  In contrast, behavior-based analysis is per-         The event auditor captures all requests received
formed on learned behavior that can’t be               by a node and the corresponding responses,
modified without losing the previous learn-            which is fundamental for behavior analysis.
ing. Generating rules is the key element in this          For each action a node performs, a log entry
technique—it helps the expert system recognize         is generated to register the methods and param-
newly discovered attacks. Creating a rule con-         eters invoked during the action.
sists of defining the set of conditions that repre-       In the experiments with the behavior-based
sent the attack.                                       IDS, we considered using audit data from both a
                                                       log and a communication system. Unfortunately,
Increasing Attack Coverage                             data from a log system—with the exception of
The two intrusion detection techniques are dis-        the message element—has a limited set of values
tinct. The knowledge-based intrusion detection         with little variation. This made it difficult to find
is characterized by a high hit rate of known at-       attack patterns, so we opted to explore communi-
tacks, but it’s deficient in detecting new attacks.    cation elements to evaluate this technique.
We therefore complemented it with the behavior-           We evaluated the behavior-based technique
based technique, which can discover deviations         using artificial intelligence enabled by a feed-
from acceptable use and thus help identify privi-      forward neural network.6 In the simulation en-
lege abuse.                                            vironment, we monitored five intruders and five
   The volume of data in a cloud computing en-         legitimate users.
vironment can be high, so administrators don’t            We initiated the neural-network training with
observe each user’s actions—they observe only          a data set representing 10 days of usage simula-
alerts from the IDS.                                   tion. Using this data resulted in a high number


	                                                                                            computer.org/ITPro   41
CYBERSECuRIT Y

                                     6
                                                                                   False positive
                                     5
        Number of false positives




                                                                                   False negative
                                                                                 actions as attacks—there were always
          and false negatives




                                     4
                                                                                 more false negatives than false posi-
               3
                                                                                 tives when using the same quantity of
               2                                                                 input data.
               1                                                                    No false alarms occurred when
                                                                                 we started the training with 16 days
               0
                   10    12   14   16   18      20     22   24 26 28   30        of simulation, although the uncer-
                                   Number of training examples                   tainty level was still high, with sev-
                                                                                 eral outputs near zero. With input
      Figure 2. The behavior score results. The algorithm had the lowest         periods of 28, 29, and 30 days, the
      number of false positives for input periods with 28–30 days.               algorithm showed a low number of
                                                                                 false positives, but after several repe-
                                                                                 titions, the quantity of false positives
              of false negatives and a high level of uncertainty.    varied, again representing the nondeterministic
              Increasing the sample period for the learning          nature of neural networks.
              phase improved the results.
                                                                                          Evaluating the Knowledge-Based System
                                    Evaluating the Behavior-Based System                  In contrast to the behavior-based system, we used
                                    To measure IDS efficiency,1 we considered ac-         audit data from both a log system and the com-
                                    curacy in terms of the system’s ability to de-        munication system to evaluate the knowledge-
                                    tect attacks and avoid false alarms. A system         based system. We created a series of rules to
                                    is imperfect if it accuses a legitimate action of     illustrate security policies that the IDS should
                                    being malicious. So, we measured accuracy             monitor.
                                    using the number of false positives (legitimate          We collected audit data referring to a route-
                                    actions marked as attacks) and false negatives        discovery service, service discovery, and service
                                    (the absence of an alert when an attack has           request and response. The series of policies we
                                    occurred).                                            created tested the system’s performance, al-
                                       The performance test we designed also eval-        though our scope didn’t include discovering new
                                    uated the analysis technique’s cost. We per-          kinds of attacks or creating an attack database.
                                    formed a load test where the program analyzed         Our goal was to evaluate our solution’s function-
                                    1 to 100,000 actions. The simulation involving        ality and the prototype’s performance.
                                    100,000 actions is hypothetical. It surpasses            The rule below characterizes an attack in any
                                    the usual data volume and served as a base for        message related to the storage service. The func-
                                    understanding system behavior in an overload-         tions of the rule are as follows:
                                    ing condition. An action took approximately
                                    0.000271 seconds to be processed with our             1.        At start-up, the rules stored in an XML file
                                    setup.                                                          are loaded into a data structure.
                                       The training time for an input of 30 days of       2.        The auditor starts to capture data from the
                                    sample behavior took 1.993 seconds. However,                    log and communication systems.
                                    the training was sporadic—we had to plan up-          3.        The data is preprocessed to create a data
                                    dates to the behavior profile database according                structure dividing log data from communi-
                                    to a routine in the execution environment (since                cation data to provide easy access to each
                                    a user’s behavior tends to change with time).                   element.
                                    This helped us identify a convenient period of        4.        The corresponding policy for the audit pack-
                                    days for determining the profile of a legitimate                age is verified.
                                    user. Artificial neural networks aren’t determin-     5.        An alert is generated if an attack or violation
                                    istic, so the number of false positives and false               occurred.
                                    negatives didn’t represent a linear decreasing
                                    progression.                                            We performed a load test for this algorithm
                                       Figure 2 shows the results. The neural net-        simulating the analysis of 10 to 1,000,000
                                    work tended to avoid identifying legitimate           rules for an action. We verified the textual or


42	                    IT Pro		July/August	2010
numerical field in comparison to the rules.                       7. P.F. da Silva and C.B. Westphall, “Improvements in
The analyzer performed two primary func-                             the Model for Interoperability of Intrusion Detec-
tions: it searched for improper content, and                         tion Responses Compatible with the IDWG Model,”
it compared numerical intervals. Comparing                           Int’l J. Network Management, vol. 17, no. 4, 2007,
100,000 rules for an action consumed 0.361                           pp. 287–294.
seconds; comparing a million rules consumed
2.7 seconds. This suggests that real-time anal-
ysis is possible up until a certain limit in the              Kleber Vieira is a team leader for a software
number of rules.                                              development company in Brazil and is a member of the
                                                              Networks and Management Laboratory at the Federal
                                                              University of Santa Catarina, Brazil. His research



I
   n testing our prototype, we learned that it                interests include information systems, software engi-
   has a low processing cost while still provid-              neering, distributed systems, and security. Vieira re-
   ing a satisfactory performance for real-time               ceived his MSc in computer science from the Federal
implementation. Sending data to other nodes for               University of Santa Cataria. Contact him at kleber@
processing didn’t seem necessary.7 The individ-               inf.ufsc.br.
ual analysis performed in each node reduces the
complexity and the volume of data in compari-                 Alexandre Schulter is an IT analyst for a Brazilian
son to previous solutions, where the audit data is            government company. Previously, he was a researcher
concentrated in single points.                                and software developer at several laboratories in the
  In the future, we’ll implement our IDS, help-               Technological Centre at the Federal University of Santa
ing to improve green (energy-efficient), white                Catarina, Brazil. His research interests include infor-
(using wireless networks), and cognitive (using               mation systems, component-based systems, software
cognitive networks) cloud computing environ-                  engineering, distributed systems, and security. Schulter
ments. We also intend to research and improve                 received his MSc in computer science from the Federal
cloud computing security.                                     University of Santa Cataria. Contact him at schulter@
                                                              inf.ufsc.br.
References
1. H. Debar, M. Dacier, and A. Wespi, “Towards a Tax-         Carlos Becker Westphall is a full professor in the
   onomy of Intrusion Detection Systems,” Int’l J. Com-       Department of Informatics and Statistics at the Fed-
   puter and Telecommunications Networking, vol. 31, no. 9,   eral University of Santa Catarina, Brazil, where he
   1999, pp. 805–822.                                         is the leader of the Networks and Management Labo-
2. I. Foster et al., “A Security Architecture for             ratory. His research interests include network man-
   Computational Grids,” Proc. 5th ACM Conf. Com-             agement, security, and grid and cloud computing.
   puter and Communications Security, ACM Press, 1998,        Westphall received his DSc in computer science from
   pp. 83–92.                                                 the Paul Sabatier University, France. Contact him at
3. S. Axelsson, Research in Intrusion-Detection Systems: A    westphal@inf.ufsc.br.
   Survey, tech. report TR-98-17, Dept. Computer Eng.,
   Chalmers Univ. of Technology, 1999.                        Carla Merkle Westphall is a professor in the
4. A. Schulter et al., “Intrusion Detection for               Department of Informatics and Statistics at the Federal
   Computational Grids,” Proc. 2nd Int’l Conf. New            University of Santa Catarina, Brazil. Her research
   Technologies, Mobility, and Security, IEEE Press, 2008,    interests include distributed security, identity manage-
   pp. 1–5.                                                   ment, and grid and cloud security. Westphall received
5. H. Franke et al., “Grid-M: Middleware to Integrate         her PhD in electrical engineering from the Federal
   Mobile Devices, Sensors and Grid Computing,” Proc.         University of Santa Cataria. Contact her at carlamw@
   3rd Int’l Conf. Wireless and Mobile Comm. (ICWMC 07),      inf.ufsc.br.
   IEEE CS Press, 2007, p. 19.
6. N.B. Idris and B. Shanmugam, “Artificial Intelligence
   Techniques Applied to Intrusion Detection,” Proc.
   2005 IEEE India Conf. (Indicon) 2005 Conf., IEEE Press,    	        Selected	 CS	 articles	 and	 columns	 are	 available	
                                                                                                                           	
   2005, pp. 52–55.                                           	        for	free	at	http://ComputingNow.computer.org.



	                                                                                                         computer.org/ITPro   43

More Related Content

What's hot

A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...IJERA Editor
 
Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2IAEME Publication
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
 
Cyber security assocham
Cyber security assochamCyber security assocham
Cyber security assochamnmrdkoz
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
 
International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)CSCJournals
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksIOSR Journals
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique IRJET Journal
 
Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...csandit
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...vishnuRajan20
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...IJCSIS Research Publications
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...IRJET Journal
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...IRJET Journal
 
Network Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure SelectionNetwork Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure SelectionPramod M Mithyantha
 

What's hot (17)

A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
 
Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
 
Cyber security assocham
Cyber security assochamCyber security assocham
Cyber security assocham
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor Networks
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
 
Nz2422822287
Nz2422822287Nz2422822287
Nz2422822287
 
Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
 
Network Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure SelectionNetwork Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure Selection
 

Viewers also liked

Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning systemkarthik4chary0
 
Tsunami Warning System
Tsunami Warning SystemTsunami Warning System
Tsunami Warning SystemGirish1020
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning systemPushkar Dutt
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning systemPriya Meena
 
E skin.pptx
E skin.pptxE skin.pptx
E skin.pptxfoysalmd
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning systemAarush Jewaria
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning systemVIBHOR RATHI
 
Life Detection Using Microwaves Technology
Life Detection Using Microwaves TechnologyLife Detection Using Microwaves Technology
Life Detection Using Microwaves TechnologySai Spandana
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning systems1180052
 
Helio display
Helio displayHelio display
Helio displaySonam M
 

Viewers also liked (11)

Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Tsunami Warning System
Tsunami Warning SystemTsunami Warning System
Tsunami Warning System
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
E skin.pptx
E skin.pptxE skin.pptx
E skin.pptx
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Life Detection Using Microwaves Technology
Life Detection Using Microwaves TechnologyLife Detection Using Microwaves Technology
Life Detection Using Microwaves Technology
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Helio display
Helio displayHelio display
Helio display
 

Similar to Intrution detection

Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusionSoft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusionAlexander Decker
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...IJORCS
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONIJNSA Journal
 
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...IRJET Journal
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxvoversbyobersby
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...IJNSA Journal
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemEswar Publications
 
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Hassan EL ALLOUSSI
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIRJET Journal
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical HackingJennifer Wood
 

Similar to Intrution detection (20)

Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusionSoft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusion
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
 
145 148
145 148145 148
145 148
 
F0371046050
F0371046050F0371046050
F0371046050
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
 
M026075079
M026075079M026075079
M026075079
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
 
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
 
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 

More from ingenioustech

Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicastingingenioustech
 
Monitoring service systems from
Monitoring service systems fromMonitoring service systems from
Monitoring service systems fromingenioustech
 
Locally consistent concept factorization for
Locally consistent concept factorization forLocally consistent concept factorization for
Locally consistent concept factorization foringenioustech
 
Measurement and diagnosis of address
Measurement and diagnosis of addressMeasurement and diagnosis of address
Measurement and diagnosis of addressingenioustech
 
Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on bufferingenioustech
 
Exploiting dynamic resource allocation for
Exploiting dynamic resource allocation forExploiting dynamic resource allocation for
Exploiting dynamic resource allocation foringenioustech
 
Efficient computation of range aggregates
Efficient computation of range aggregatesEfficient computation of range aggregates
Efficient computation of range aggregatesingenioustech
 
Dynamic measurement aware
Dynamic measurement awareDynamic measurement aware
Dynamic measurement awareingenioustech
 
Design and evaluation of a proxy cache for
Design and evaluation of a proxy cache forDesign and evaluation of a proxy cache for
Design and evaluation of a proxy cache foringenioustech
 
Throughput optimization in
Throughput optimization inThroughput optimization in
Throughput optimization iningenioustech
 
Phish market protocol
Phish market protocolPhish market protocol
Phish market protocolingenioustech
 
Peering equilibrium multi path routing
Peering equilibrium multi path routingPeering equilibrium multi path routing
Peering equilibrium multi path routingingenioustech
 
Online social network
Online social networkOnline social network
Online social networkingenioustech
 
On the quality of service of crash recovery
On the quality of service of crash recoveryOn the quality of service of crash recovery
On the quality of service of crash recoveryingenioustech
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingingenioustech
 
Bayesian classifiers programmed in sql
Bayesian classifiers programmed in sqlBayesian classifiers programmed in sql
Bayesian classifiers programmed in sqlingenioustech
 

More from ingenioustech (20)

Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicasting
 
Monitoring service systems from
Monitoring service systems fromMonitoring service systems from
Monitoring service systems from
 
Locally consistent concept factorization for
Locally consistent concept factorization forLocally consistent concept factorization for
Locally consistent concept factorization for
 
Measurement and diagnosis of address
Measurement and diagnosis of addressMeasurement and diagnosis of address
Measurement and diagnosis of address
 
Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on buffer
 
Exploiting dynamic resource allocation for
Exploiting dynamic resource allocation forExploiting dynamic resource allocation for
Exploiting dynamic resource allocation for
 
Efficient computation of range aggregates
Efficient computation of range aggregatesEfficient computation of range aggregates
Efficient computation of range aggregates
 
Dynamic measurement aware
Dynamic measurement awareDynamic measurement aware
Dynamic measurement aware
 
Design and evaluation of a proxy cache for
Design and evaluation of a proxy cache forDesign and evaluation of a proxy cache for
Design and evaluation of a proxy cache for
 
Throughput optimization in
Throughput optimization inThroughput optimization in
Throughput optimization in
 
Tcp
TcpTcp
Tcp
 
Privacy preserving
Privacy preservingPrivacy preserving
Privacy preserving
 
Phish market protocol
Phish market protocolPhish market protocol
Phish market protocol
 
Peering equilibrium multi path routing
Peering equilibrium multi path routingPeering equilibrium multi path routing
Peering equilibrium multi path routing
 
Peace
PeacePeace
Peace
 
Online social network
Online social networkOnline social network
Online social network
 
On the quality of service of crash recovery
On the quality of service of crash recoveryOn the quality of service of crash recovery
On the quality of service of crash recovery
 
Layered approach
Layered approachLayered approach
Layered approach
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
 
Bayesian classifiers programmed in sql
Bayesian classifiers programmed in sqlBayesian classifiers programmed in sql
Bayesian classifiers programmed in sql
 

Recently uploaded

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

Intrution detection

  • 1. CYBERSECuRITY Intrusion Detection for Grid and Cloud Computing Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall, Federal University of Santa Catarina, Brazil Providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. The Grid and Cloud Computing Intrusion Detection System integrates knowledge and behavior analysis to detect intrusions. B ecause of their distributed nature, usually provides these features, so we propose an grid and cloud computing environ- IDS service offered at the middleware layer (as ments are easy targets for intruders opposed to the infrastructure or software layers). looking for possible vulnerabilities to An attack against a cloud computing system exploit. By impersonating legitimate users, the can be silent for a network-based IDS deployed in intruders can use a service’s abundant resources its environment, because node communication maliciously. is usually encrypted. Attacks can also be invisi- To combat attackers, intrusion-detection sys- ble to host-based IDSs, because cloud-specific tems (IDSs) can offer additional security mea- attacks don’t necessarily leave traces in a node’s sures for these environments by investigating operating system, where the host-based IDS re- configurations, logs, network traffic, and user sides. In this way, traditional IDSs can’t appro- actions to identify typical attack behavior.1 How- priately identify suspicious activities in a grid and ever, an IDS must be distributed to work in a grid cloud environment3 (see the “Related Work in and cloud computing environment. It must mon- Intrusion Detection” sidebar). itor each node and, when an attack occurs, alert Here, we take a careful look at the cloud other nodes in the environment. This kind of case in particular. We propose the Grid and communication requires compatibility between Cloud Computing Intrusion Detection System heterogeneous hosts, various communication (GCCIDS), which has an audit system designed to mechanisms, and permission control over system cover attacks that network- and host-based sys- maintenance and updates—typical features in tems can’t detect. GCCIDS integrates knowledge grid and cloud environments.2 Cloud middleware and behavior analysis to detect specific intrusions. 38 IT Pro July/August 2010 Published by the IEEE Computer Society 1520-9202/10/$26.00 © 2010 IEEE
  • 2. Related Work in Intrusion Detection H ere we present some of the relevant research on intrusion detection for grids, discussing in par- ticular the techniques they apply and the source of they apply behavior-based techniques in the analy- sis. In comparison, we conclude that the available solutions approach the problem in a different way, the data they analyze. especially in regards to the threats we try to de- Table A classifies related work according to the audit fend against by combining two distinct auditing data source (host, network, or grid), the analysis tech- techniques. nique (knowledge- or behavior-based), and if there was a proper evaluation. Fang-Yie Leu, Jia-Chun Lin, References Ming-Chang Li, Chao-Tung Yang, and Po-Chi Shih’s 1. F-Y. Leu et al., “Integrating Grid with Intrusion Detection,” work,1 along with Stuart Kenny and Brian Coghlan’s2 Proc. Int’l Conf. Advanced Information Networking and solutions, are based on analyzing data from a grid’s Applications (AINA 05), vol. 1, IEEE CS Press, 2005, network, although these approaches can’t detect pp. 304–309. grid-specific attacks, because they don’t capture any 2. S. Kenny and B. Coghlan, “Towards a Grid-Wide high-level data. Guofu Feng, Xiaoshe Dong, Weizhe Intrusion Detection System,” Proc. European Grid Conf. Liu, Ying Chu, and Junyang Li integrate a host-based (EGC 05), Springer, 2005, pp. 275–284. intrusion-detection system (IDS) into a grid environ- 3. G. Feng et al., “GHIDS: Defending Computational Grids ment, providing protection against typical operating against Misusing of Shared Resource,” Proc. Asia-Pacific system attacks, but not the ones that might target Conf. Services Computing (APSCC 06), IEEE CS Press, middleware vulnerabilities.3 2006, pp. 526–533. Mohamed Tolba 4 and Alexandre Schulter5 and 4. M. Tolba et al., “Distributed Intrusion Detection System their colleagues view a computational grid as one for Computational Grids,” Proc. 2nd Int’l Conf. Intelligent big host of resources, and the audit data is collected Computing and Information Systems (ICICIS 05), 2005. from the operating systems as in typical host-based 5. A. Schulter et al., “Intrusion Detection for Computational IDSs. Their solutions focus on analyzing high-level Grids,” Proc. 2nd Int’l Conf. New Technologies, Mobility, information regarding grid usage by its users, and and Security, IEEE Press, 2008, pp. 1–5. Table A. Features of related works concerning intrusion detection for grids. Knowledge- Behavior- Host-based Network- Data from based based Author IDS based IDS a grid technique technique Validation Tolba Yes No Yes No Yes Yes Schulter Yes Yes No No Yes Yes Choon No Yes N/A No No No Kenny No Yes No Yes No Yes Leu No Yes No Yes No Yes Feng Yes No No Yes No Yes Our Proposed Service policies and suppor ts a ser vice-oriented In our solution, each node identifies local events environment. that could represent security violations and alerts The service provides its functionality in the the other nodes. Each individual IDS coopera- environment through the middleware, which tively participates in intrusion detection. Figure 1 facilitates communication. depicts the sharing of information between the The event auditor is the key piece in the sys- IDS service and the other elements participating tem. It captures data from various sources, in the architecture: the node, service, event audi- such as the log system, service, and node mes- tor, and storage service. sages. The IDS service analyzes this data and The node contains the resources, which are applies detection techniques based on user be- accessed homogeneously through the middle- havior and knowledge of previous attacks. If it ware. The middleware sets the access-control detects an intrusion, it uses the middleware’s computer.org/ITPro 39
  • 3. CYBERSECuRIT Y Grid node Grid node Service Service known trails left by attacks or certain IDS service IDS service sequences of actions from a user who Event auditor Event auditor Analyzer Analyzer might represent an attack. Alert system Alert system The audited data is sent to the IDS Storage service Storage service service core, which analyzes the be- havior using artificial intelligence to detect deviations. The analyzer uses Knowledge Behavior Knowledge Behavior a profile history database to deter- base base base base mine the distance between a typical user behavior and the suspect behav- ior and communicates this to the IDS Grid node service. Service The rules analyzer receives audit packages and determines whether a IDS service rule in the database is being broken. Event auditor Analyzer It returns the result to the IDS service Alert system core. With these responses, the IDS Storage service calculates the probability that the ac- tion represents an attack and alerts the other nodes if the probability is Knowledge Behavior sufficiently high. base base Event Auditor Alert system To detect an intrusion, we need Synchronize audit data describing the environ- Communication service ment’s state and the messages being Service exchanged. The event auditor can monitor the data that the analyzers Database are accessing. The first component monitors message exchange between nodes. Although audit information Figure 1. The architecture of grid and cloud computing intrusion about the communication between detection. Each node identifies local events that could represent nodes is being captured, no network security violations and sends an alert to the other nodes. data is taken into account—only node information. communication mechanisms to send alerts The second component monitors the middle- to the other nodes. The middleware synchro- ware logging system. For each action occurring nizes the known-attacks and user-behavior in a node, a log entry is created containing the databases. action’s type (such as error, alert, or warning), the The storage service holds the data that the IDS event that generated it, and the message. With service must analyze. It’s important for all nodes this kind of data, it’s possible to identify an ongo- to have access to the same data, so the middle- ing intrusion. ware must transparently create a virtualization of the homogeneous environment. Behavior Analysis Numerous methods exist for behavior-based IDS Service intrusion detection, such as data mining, ar- The IDS service increases a cloud’s security tificial neural networks, and artificial immu- level by applying two methods of intrusion nological systems. We use a feed-for ward detection. The behavior-based method dictates artificial neural network, because—in contrast how to compare recent user actions to the usual to traditional methods—this type of network can behavior. The knowledge-based method detects quickly process information, has self-learning 40 IT Pro July/August 2010
  • 4. capabilities, and can tolerate small behavior Results deviations. These features help overcome some We developed a prototype to evaluate the pro- IDS limitations.4 posed architecture using Grid-M, a middleware Using this method, we need to recognize ex- of our research group developed at the Federal pected behavior (legitimate use) or a severe be- University of Santa Catarina.5 havior deviation. Training plays a key role in the We created data tables to perform the experi- pattern recognition that feed-forward networks ments with audit elements coming from both the perform. The network must be correctly trained log system and from data captured during node to efficiently detect intrusions. For a given intru- communications. We prepared three types of sion sample set, the network learns to identify the simulation data to test. intrusions using its retropropagation algorithm. First, we created data representing legitimate However, we focus on identifying user behav- action by executing a set of known services simu- ioral patterns and deviations from such patterns. lating a regular behavior. With this strategy, we can cover a wider range of Then, we created data representing behavior unknown attacks. anomalies. To represent anomalous sequences of actions, we altered the services and their us- Knowledge Analysis age frequency. For example, for a teaching depart- Knowledge-based intrusion detection is the ment that posts grades electronically, if two out of most often applied technique in the field be- every 100 grades are typically corrected later be- cause it results in a low false-alarm rate and high cause of a mistake, then an anomalous behavior positive rates, although it can’t detect unknown would be correcting 10 consecutive grades. This attack patterns. It uses rules (also called signa- action would deserve special attention to deter- tures) and monitors a stream of events to find mine whether it constituted an abuse of privileges. malicious characteristics. Finally, we created data representing policy Using an expert system, we can describe a violation. This was prepared with a set of audit malicious behavior with a rule. One advantage packages containing a series of elements violat- of using this kind of intrusion detection is that ing base rules. we can add new rules without modifying exist- ing ones. Evaluating the Event Auditor In contrast, behavior-based analysis is per- The event auditor captures all requests received formed on learned behavior that can’t be by a node and the corresponding responses, modified without losing the previous learn- which is fundamental for behavior analysis. ing. Generating rules is the key element in this For each action a node performs, a log entry technique—it helps the expert system recognize is generated to register the methods and param- newly discovered attacks. Creating a rule con- eters invoked during the action. sists of defining the set of conditions that repre- In the experiments with the behavior-based sent the attack. IDS, we considered using audit data from both a log and a communication system. Unfortunately, Increasing Attack Coverage data from a log system—with the exception of The two intrusion detection techniques are dis- the message element—has a limited set of values tinct. The knowledge-based intrusion detection with little variation. This made it difficult to find is characterized by a high hit rate of known at- attack patterns, so we opted to explore communi- tacks, but it’s deficient in detecting new attacks. cation elements to evaluate this technique. We therefore complemented it with the behavior- We evaluated the behavior-based technique based technique, which can discover deviations using artificial intelligence enabled by a feed- from acceptable use and thus help identify privi- forward neural network.6 In the simulation en- lege abuse. vironment, we monitored five intruders and five The volume of data in a cloud computing en- legitimate users. vironment can be high, so administrators don’t We initiated the neural-network training with observe each user’s actions—they observe only a data set representing 10 days of usage simula- alerts from the IDS. tion. Using this data resulted in a high number computer.org/ITPro 41
  • 5. CYBERSECuRIT Y 6 False positive 5 Number of false positives False negative actions as attacks—there were always and false negatives 4 more false negatives than false posi- 3 tives when using the same quantity of 2 input data. 1 No false alarms occurred when we started the training with 16 days 0 10 12 14 16 18 20 22 24 26 28 30 of simulation, although the uncer- Number of training examples tainty level was still high, with sev- eral outputs near zero. With input Figure 2. The behavior score results. The algorithm had the lowest periods of 28, 29, and 30 days, the number of false positives for input periods with 28–30 days. algorithm showed a low number of false positives, but after several repe- titions, the quantity of false positives of false negatives and a high level of uncertainty. varied, again representing the nondeterministic Increasing the sample period for the learning nature of neural networks. phase improved the results. Evaluating the Knowledge-Based System Evaluating the Behavior-Based System In contrast to the behavior-based system, we used To measure IDS efficiency,1 we considered ac- audit data from both a log system and the com- curacy in terms of the system’s ability to de- munication system to evaluate the knowledge- tect attacks and avoid false alarms. A system based system. We created a series of rules to is imperfect if it accuses a legitimate action of illustrate security policies that the IDS should being malicious. So, we measured accuracy monitor. using the number of false positives (legitimate We collected audit data referring to a route- actions marked as attacks) and false negatives discovery service, service discovery, and service (the absence of an alert when an attack has request and response. The series of policies we occurred). created tested the system’s performance, al- The performance test we designed also eval- though our scope didn’t include discovering new uated the analysis technique’s cost. We per- kinds of attacks or creating an attack database. formed a load test where the program analyzed Our goal was to evaluate our solution’s function- 1 to 100,000 actions. The simulation involving ality and the prototype’s performance. 100,000 actions is hypothetical. It surpasses The rule below characterizes an attack in any the usual data volume and served as a base for message related to the storage service. The func- understanding system behavior in an overload- tions of the rule are as follows: ing condition. An action took approximately 0.000271 seconds to be processed with our 1. At start-up, the rules stored in an XML file setup. are loaded into a data structure. The training time for an input of 30 days of 2. The auditor starts to capture data from the sample behavior took 1.993 seconds. However, log and communication systems. the training was sporadic—we had to plan up- 3. The data is preprocessed to create a data dates to the behavior profile database according structure dividing log data from communi- to a routine in the execution environment (since cation data to provide easy access to each a user’s behavior tends to change with time). element. This helped us identify a convenient period of 4. The corresponding policy for the audit pack- days for determining the profile of a legitimate age is verified. user. Artificial neural networks aren’t determin- 5. An alert is generated if an attack or violation istic, so the number of false positives and false occurred. negatives didn’t represent a linear decreasing progression. We performed a load test for this algorithm Figure 2 shows the results. The neural net- simulating the analysis of 10 to 1,000,000 work tended to avoid identifying legitimate rules for an action. We verified the textual or 42 IT Pro July/August 2010
  • 6. numerical field in comparison to the rules. 7. P.F. da Silva and C.B. Westphall, “Improvements in The analyzer performed two primary func- the Model for Interoperability of Intrusion Detec- tions: it searched for improper content, and tion Responses Compatible with the IDWG Model,” it compared numerical intervals. Comparing Int’l J. Network Management, vol. 17, no. 4, 2007, 100,000 rules for an action consumed 0.361 pp. 287–294. seconds; comparing a million rules consumed 2.7 seconds. This suggests that real-time anal- ysis is possible up until a certain limit in the Kleber Vieira is a team leader for a software number of rules. development company in Brazil and is a member of the Networks and Management Laboratory at the Federal University of Santa Catarina, Brazil. His research I n testing our prototype, we learned that it interests include information systems, software engi- has a low processing cost while still provid- neering, distributed systems, and security. Vieira re- ing a satisfactory performance for real-time ceived his MSc in computer science from the Federal implementation. Sending data to other nodes for University of Santa Cataria. Contact him at kleber@ processing didn’t seem necessary.7 The individ- inf.ufsc.br. ual analysis performed in each node reduces the complexity and the volume of data in compari- Alexandre Schulter is an IT analyst for a Brazilian son to previous solutions, where the audit data is government company. Previously, he was a researcher concentrated in single points. and software developer at several laboratories in the In the future, we’ll implement our IDS, help- Technological Centre at the Federal University of Santa ing to improve green (energy-efficient), white Catarina, Brazil. His research interests include infor- (using wireless networks), and cognitive (using mation systems, component-based systems, software cognitive networks) cloud computing environ- engineering, distributed systems, and security. Schulter ments. We also intend to research and improve received his MSc in computer science from the Federal cloud computing security. University of Santa Cataria. Contact him at schulter@ inf.ufsc.br. References 1. H. Debar, M. Dacier, and A. Wespi, “Towards a Tax- Carlos Becker Westphall is a full professor in the onomy of Intrusion Detection Systems,” Int’l J. Com- Department of Informatics and Statistics at the Fed- puter and Telecommunications Networking, vol. 31, no. 9, eral University of Santa Catarina, Brazil, where he 1999, pp. 805–822. is the leader of the Networks and Management Labo- 2. I. Foster et al., “A Security Architecture for ratory. His research interests include network man- Computational Grids,” Proc. 5th ACM Conf. Com- agement, security, and grid and cloud computing. puter and Communications Security, ACM Press, 1998, Westphall received his DSc in computer science from pp. 83–92. the Paul Sabatier University, France. Contact him at 3. S. Axelsson, Research in Intrusion-Detection Systems: A westphal@inf.ufsc.br. Survey, tech. report TR-98-17, Dept. Computer Eng., Chalmers Univ. of Technology, 1999. Carla Merkle Westphall is a professor in the 4. A. Schulter et al., “Intrusion Detection for Department of Informatics and Statistics at the Federal Computational Grids,” Proc. 2nd Int’l Conf. New University of Santa Catarina, Brazil. Her research Technologies, Mobility, and Security, IEEE Press, 2008, interests include distributed security, identity manage- pp. 1–5. ment, and grid and cloud security. Westphall received 5. H. Franke et al., “Grid-M: Middleware to Integrate her PhD in electrical engineering from the Federal Mobile Devices, Sensors and Grid Computing,” Proc. University of Santa Cataria. Contact her at carlamw@ 3rd Int’l Conf. Wireless and Mobile Comm. (ICWMC 07), inf.ufsc.br. IEEE CS Press, 2007, p. 19. 6. N.B. Idris and B. Shanmugam, “Artificial Intelligence Techniques Applied to Intrusion Detection,” Proc. 2005 IEEE India Conf. (Indicon) 2005 Conf., IEEE Press, Selected CS articles and columns are available 2005, pp. 52–55. for free at http://ComputingNow.computer.org. computer.org/ITPro 43