Performance Improvement Scheme of NIDS Through Optimized Intrusion Pattern Database
Main Article Content
Abstract
Network-based intrusion detection systems (NIDS) are perceptively distributed devices within computer networks. They aim to examine traffic passing through the network on which they are installed passively. The database is the most vital part of network intrusion detection systems, as all the data converted information from the NIDS needs to be saved in a patterned structured manner. Understanding the usability of several available types of databases like central databases, Distributed databases, operational databases, etc., it is on the developer’s end to choose the most comprehensive one. Data transformation and performance speed are essential features that a stable database can handle. In this paper, we have analyzed the performance of multiple databases to find out the proficient way that favors NIDS optimization.
[Manuscript received: 21 December 2023 | Accepted: 26 March 2024 | Published: : 30 April 2024]
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
Y. Wang, Y. Cheng, Q. Qi, and F. Tao, “Ids-kg: An industrial dataspace-based knowledge graph construction approach for smart maintenance,” Journal of Industrial Information Integration, p. 100566, 2024.
M. Yu, W. Zang, and P. Liu, “Database isolation and filtering against data corruption attacks,” in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). IEEE, 2007, pp. 97–106.
K.-m. Zheng, X. Qian, and N. An, “Supervised non-linear dimensionality reduction techniques for classification in intrusion detection,” in 2010 International Conference on Artificial Intelligence and Computational Intelligence, vol. 1. IEEE, 2010, pp. 438–442.
A. Kummerow, K. Schaefer, C. Monsalve, M. Alramlawi, S. Nicolai, and P. Bretschneider, “A cyber-security testbed for the dynamic operation of transmission power systems,” in ETG Congress 2023. VDE, 2023, pp. 1–6.
J. Pavlik and N. D. Bastian, “Cyber creative generative adversarial network for novel malicious packets,” Proceedings in, Synthetic Data for Artificial Intelligence and Machine Learning: Tools, Techniques, and Applications, vol. 12529, 2023.
A. Kalidindi and M. B. Arrama, “Enhancing iot security with deep stack encoder using various optimizers for botnet attack prediction,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 6, 2023.
T. Ban, T. Takahashi, S. Ndichu, and D. Inoue, “Breaking alert fatigue: Ai-assisted siem framework for effective incident response,” Applied Sciences, vol. 13, no. 11, p. 6610, 2023.
A. Nisioti, A. Mylonas, P. D. Yoo, and V. Katos, “From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods,” IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 3369–3388, 2018.
A. Jannat, U. Hayat and T. Sadiq, "Exploration of Machine Learning Algorithms for Development of Intelligent Intrusion Detection Systems," International Conference on Communication, Computing and Digital Systems (C-CODE), Islamabad, Pakistan, 2023, pp. 1-6, doi: 10.1109/C-CODE58145.2023.10139885.
S. Myneni, K. Jha, A. Sabur, G. Agrawal, Y. Deng, A. Chowdhary, and D. Huang, “Unraveled a semi-synthetic dataset for advanced persistent threats,” Computer Networks, vol. 227, p. 109688, 2023.
M. P. A. Saviour and D. Samiappan, “Ipfs based storage authentication and access control model with optimization enabled deep learning for intrusion detection,” Advances in Engineering Software, vol. 176, p. 103369, 2023.
H. J. Hadi, U. Hayat, N. Musthaq, F. B. Hussain and Y. Cao, "Developing Realistic Distributed Denial of Service (DDoS) Dataset for Machine Learning-based Intrusion Detection System," 9th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Milan, Italy, pp.1-6, 2022, doi:10.1109/IOTSMS58070.2022.10062034.
M. Verkerken, L. D’hooge, D. Sudyana, Y.-D. Lin, T. Wauters, B. Vol- ckaert, and F. De Turck, “A novel multi-stage approach for hierarchical intrusion detection,” IEEE Transactions on Network and Service Management, vol. 20, pp. 3915-3929, 2023.
S. Bhosale, A. Deshmukh, B. Deore, and P. Bhosale, “Anomaly detection through adaptive daso optimization techniques,” Artificial Intelligence. IntechOpen, Jan. 17, 2024. doi: 10.5772/intechopen.112421.
W. Zhong, N. Yu, and C. Ai, “Applying big data based deep learning system to intrusion detection,” Big Data Mining and Analytics, vol. 3, no. 3, pp. 181–195, 2020.
H.-Y. Kwon, T. Kim, and M.-K. Lee, “Advanced intrusion detection combining signature-based and behavior-based detection methods,” Electronics, vol. 11, no. 6, p. 867, 2022.
Y. K. Saheed, “Performance improvement of intrusion detection system for detecting attacks on internet of things and edge of things,” in Artificial Intelligence for Cloud and Edge Computing. Springer, 2022, pp. 321–339.
A. Shokoohsaljooghi and H. Mirvaziri, “Performance improvement of intrusion detection system using neural networks and particle swarm optimization algorithms,” International Journal of Information Technology, vol. 12, pp. 849–860, 2020.
Y. Tsuru, T. Kawakami, and T. Hasegawa, “Distributed network intrusion detection system using federated learning,” IEICE Technical Report; IEICE Tech. Rep., vol. 122, no. 15, pp. 20–25, 2022.
P, Rajesh Kanna and S S, Rajasekar and P, Santhi and G, Sathish Kumar, Mshids: Multi-Stage Hybrid Intrusion Detection System Using Flow and Packet-Based Intrusion Analysis in Big Data Environment. Preprint Available at SSRN: https://ssrn.com/abstract=4401867
P. Parkar and A. Bilimoria, “A survey on cyber security ids using ml methods,” in 2021 5th International Conference on Intelligent Comput- ing and Control Systems (ICICCS). IEEE, 2021, pp. 352–360.
A. Henry, S. Gautam, S. Khanna, K. Rabie, T. Shongwe, P. Bhattacharya, Sharma, and S. Chowdhury, “Composition of hybrid deep learning model and feature optimization for intrusion detection system,” Sensors, vol. 23, no. 2, p. 890, 2023.
I. A. Khan, N. Moustafa, D. Pi, W. Haider, B. Li, and A. Jolfaei, “An enhanced multi-stage deep learning framework for detecting malicious activities from autonomous vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 12, pp. 25 469–25 478, 2021.
Y. A. Al-Khassawneh, “An investigation of the intrusion detection system for the nsl-kdd dataset using machine-learning algorithms,” in 2023 IEEE International Conference on Electro Information Technology IEEE, 2023, pp. 518–523.
A. Alzaqebah, I. Aljarah, and O. Al-Kadi, “A hierarchical intrusion detection system based on extreme learning machine and nature-inspired optimization,” Computers & Security, vol. 124, p. 102957, 2023.
O. Sen, P. Malskorn, S. Glomb, I. Hacker, M. Henze, and A. Ulbig, “An approach to abstract multi-stage cyberattack data generation for ml-based ids in smart grids,” in 2023 IEEE Belgrade PowerTech. IEEE, 2023, pp. 01–10.