The Complex Method of Intrusion Detection Based on Anomaly Detection and Misuse Detection

Tamara Radivilova, Lyudmyla Kirichenko, Abed Saif Alghawli, Andrii Ilkov, Maxim Tawalbeh, Petro Zinchenko

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Scopus citations

Abstract

Intrusion detection is an important task on network cybersecurity. Intrusion detection systems solve this problem by using various methods. An analysis of the relevant works that offer possible solutions are presented, and a description of the proposed complex method that allows online identification of attacks is provided. The proposed complex method based on the joint application of the signature analysis method, entropy protocols analysis method, and machine learning method for behavior traffic analysis. The probability of intrusion detection used and based on the confusion matrix, the completeness, and the F-measure. There is a problem not only to detect the attacks but to identify the type of ones. Many attacks can be detected by using the proposed complex method, but also, this method allows to identify the type of attack and choose the type of defenses. The proposed complex method was compared to existing methods. Simulation results have shown that the proposed method better identifies attacks and has fewer false positives detections.

Original languageEnglish
Title of host publicationProceedings - 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies, DESSERT 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages133-137
Number of pages5
ISBN (Electronic)9781728199573
DOIs
StatePublished - May 2020
Event11th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT 2020 - Kyiv, Ukraine
Duration: 14 May 202018 May 2020

Publication series

NameProceedings - 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies, DESSERT 2020

Conference

Conference11th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT 2020
Country/TerritoryUkraine
CityKyiv
Period14/05/2018/05/20

Keywords

  • anomaly detection
  • attacks
  • behavior method
  • complex method
  • entropy analysis
  • Intrusion detection system
  • machine learning
  • signature analysis

Fingerprint

Dive into the research topics of 'The Complex Method of Intrusion Detection Based on Anomaly Detection and Misuse Detection'. Together they form a unique fingerprint.

Cite this