Downloads: 116 | Views: 249
Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 7, July 2017 | Popularity: 6.3 / 10
A Hybrid Approach for Intrusion Detection System
Hussam A. Al-Ameen
Abstract: Buffer Overflow (BOF) have become the most common target for network-based attacks and on the other side many detection and prevention techniques have been developed to secure the systems and networks known Intrusion Detection Systems (IDS). The paper deals with the problem of BOF and proposes an IDS which is a combination of Host Intrusion Detection System (HIDS) and Network Intrusion Detection System (NIDS). It is designed to detect any attempt of BOF attack that use the Call/Jump Register technique depending on the use of set of available memory addresses of Call/Jump instructions for loaded DLL files uses them as a return addresses that point to the attacker malicious code being used to exploit the system. The proposed system generates two signature files, one for HIDS and the other for NIDS. The Monitoring and Detection Engine in the HIDS depend on On-Access-Scan technique to capture any file that contains the attack signature as they open and log them to a log file. Besides that, the Monitoring and Detection Engine in the NIDS depends on Snort system to sniff and capture any data packets in the network traffic that contain the attack signature and log them to another log file. An Analysis Engine applies a set of statistical operations and a Fuzzy Analysis System on log files in order to produce a set of reports in the form of PHP web sites that represent the analysis output that give the degree of BOF attack risk.
Keywords: HIDS, NIDS, Buffer Overflow
Edition: Volume 6 Issue 7, July 2017
Pages: 1149 - 1157
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 101 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1147 - 1150Enhance QoS of Lossy Wireless Sensor Network by In-Network Data Aggregation
Harshada Kupade, Madhav Ingle
Downloads: 108
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 511 - 516Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset
Swapnali G. Game, S. B. Natikar
Downloads: 116
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2195 - 2197A Survey on Various Techniques for Classifying Attacks in NIDS
Ruchira Gurav, Aparna Junnarkar
Downloads: 117
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 2651 - 2653Survey on Congestion Control Mechanism for TCP
Tejashri P. Mane, Snehal Kanade