DOI QR코드

DOI QR Code

An Hybrid Probe Detection Model using FCM and Self-Adaptive Module

자가적응모듈과 퍼지인식도가 적용된 하이브리드 침입시도탐지모델

  • 이세열 (청운대학교 컴퓨터학과)
  • Received : 2017.08.25
  • Accepted : 2017.09.07
  • Published : 2017.09.30

Abstract

Nowadays, networked computer systems play an increasingly important role in our society and its economy. They have become the targets of a wide array of malicious attacks that invariably turn into actual intrusions. This is the reason computer security has become an essential concern for network administrators. Recently, a number of Detection/Prevention System schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems, are useful only for the existing patterns of intrusion. Therefore, probe detection has become a major security protection technology to detection potential attacks. Probe detection needs to take into account a variety of factors ant the relationship between the various factors to reduce false negative & positive error. It is necessary to develop new technology of probe detection that can find new pattern of probe. In this paper, we propose an hybrid probe detection using Fuzzy Cognitive Map(FCM) and Self Adaptive Module(SAM) in dynamic environment such as Cloud and IoT. Also, in order to verify the proposed method, experiments about measuring detection rate in dynamic environments and possibility of countermeasure against intrusion were performed. From experimental results, decrease of false detection and the possibilities of countermeasures against intrusions were confirmed.

Keywords

References

  1. B. Mukherjee, "Network intusion detection," IEEE Network, Vol. 8, No. 3, 1994, pp. 26-41. https://doi.org/10.1109/65.283931
  2. M. Stula, "Fuzzy cognitive map for decision support in image post-processing," 18th International Conference on systems signal and image processing, Vol. 11, 2011, pp. 4-9.
  3. S. Lee, Y. Kim, and B. Lee, "A Probe Detection Model using the Analysis of the Fuzzy Cognitive Maps," International Conference Cyber and Security, Vol. 3480, 2005, pp. 320-328.
  4. J. Park, and M. Park, "A Whitelist-based Scheme for Detecting and Preventing Unauthorized AP Acess using Mobile Device," Journal of the Korea Information Communications Society, Vol. 10, No. 3, 2012, pp. 632-640.
  5. W. Xiang, "Application of BP neural network with L-M algorithm in power transformer fault diagnosis," International Power system protection and control, Vol 10, No. 1, 2011, pp. 100-104.
  6. S. Y. Lee, "An Adaptive Probe Detection Model using Fuzzy Cognitive Maps," Ph. D. Dissertation, Daejeon University, 2003.
  7. Y. Brum, G. Serugendo, and M. Litoiu, "Engineering Self Adaptive Systems through Feedback Loops," In Software Engineering for Self Adaptive Systems, Springer-Verlag, 2009, 2013, pp. 48-70.
  8. J. Moon, and Y. Chang, "A Malware Detection Application Framework Based on Normal Behavior," The Journal of the Convergence on Culure, Vol. 2, No. 1, 2016, pp. 79-85. https://doi.org/10.17703/JCCT.2016.2.1.79
  9. 조성래.성행남.안병혁, "의사결정트리와 인공 신경망 기법을 이용한 침입탐지 효율성 비교 연구," 디지털산업정보학회논문지, 제11권, 제4호, 2015, pp. 33-45. https://doi.org/10.17662/KSDIM.2015.11.4.033
  10. 양환석, "프로토콜 기반 분산 침입탐지시스템 설계 및 구현," 디지털산업정보학회논문지, 제8권, 제1호, 2012, pp. 81-87.
  11. Ostinato: http://ostinato.org/
  12. Hping3: http://tools.kali.org/

Cited by

  1. 블록체인을 적용한 사설 클라우드 기반 침입시도탐지 vol.14, pp.2, 2018, https://doi.org/10.17662/ksdim.2018.14.2.011