DOI QR코드

DOI QR Code

Anonymized Network Monitoring for Intrusion Detection Systems

  • Srinivas, DB (Department of Information Science and Engineering Nitte Meenakshi Institute of Technology) ;
  • Mohan, Sagar (Department of Information Science and Engineering Nitte Meenakshi Institute of Technology)
  • Received : 2022.07.05
  • Published : 2022.07.30

Abstract

With the ever-increasing frequency of public sector and smalls-cale industries going live on the internet in developing countries, their security of which, while crucial, is often overlooked in most cases. This is especially true in Government services, whilst essential, are poorly monitored if at all. This is due to lack of funds and personnel. Most available software which can help these organizations monitor their services are either expensive or very outdated. Thus, there is a need for any developing country to develop a networking monitoring system. However, developing a network monitoring system is still a challenge and expensive and out sourcing network monitoring system to third party is a security threat. Therefore, in this article we propose a method to anonymize network logs and outsource networking monitoring system to third-party without breach in integrity of their network logs.

Keywords

References

  1. Ministry of Communications and Information Technology, Government of India, "National cyber security policy." [Online]. Available: https://www.meity.gov.in/writereaddata/files/ncsp060411.pdf
  2. Ministry of Communications and Information Technology, Government of India , "Intermediary guidelines and digital media ethics code rules 2021." [Online]. Available: https://bit.ly/3AEjRxJ
  3. Ministry of Power, Government of India, "Cybersecurity in power sector guidelines 2021." [Online]. Available: https://bit.ly/3yUjjT1.
  4. S. Sharma and M. Khadke, "Network Security: A Major Challenge in India," in 2018 4th International Conference on Computing Communication and Automation (ICCCA). IEEE, pp. 1-5. [Online]. Available: https://ieeexplore.ieee.org/document/8777642/
  5. N. Chauhan, "Almost 300% rise in cyberattacks in india in 2020, govt tells parliament," The Hindustan Times. [Online]. Available: https://www.hindustantimes.com/india-news/almost-300-rise-in-cyber-attacks-in-india-in-2020-govt-tells-parliament-101616496416988.html
  6. D. Bhardwaj, "In wake of increased attacks, govt trains 4,000 officials in cybersecurity," The Hindustan Times. [Online]. Available: https://www.hindustantimes.com/india-news/in-wake-of-increased-attacks-govt-trains-4-000-officials-incybersecurity-101617683297609.html.
  7. Col. Sanjeev Relia, "India's tryst with a new national cyber security policy: Here's what we need," Financial Express. [Online].Available: https://www.financialexpress.com/defence/indias-trystwith-a-new-national-cyber-security-policy-heres-what-we-need/2304053/.
  8. S. Gatlan, "Red cross: State hackers breached our network using zoho bug," Bleeping Computer. [Online]. Availiable: https://www.bleepingcomputer.com/news/security/red-cross-state-hackers-breached-our-network-using-zoho-bug
  9. G. Cluley, "Greenland hit by cyber attack, finds its health service crippled," Bitdefender. [Online]. Availiable: https://www.bitdefender.com/blog/hotforsecurity/greenland-hit-by-cyber-attack-finds-its-health-service-crippled.
  10. A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, "Survey of intrusion detection systems: Techniques, datasets and challenges," vol. 2, no. 1, p. 20. [Online]. Available: https://cybersecurity.springeropen.com/articles/10.1186/s42400-019-0038-7/
  11. E. Anthi, L. Williams, P. Burnap, and K. Jones, "A three-tiered intrusion detection system for industrial control systems," vol. 7, no. 1, p. tyab006. [Online]. Available: https://doi.org/10.1093/cybsec/tyab006
  12. K. Lakkaraju and A. Slagell, "Evaluating the utility of anonymized network traces for intrusion detection," in Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks - SecureComm '08. ACM Press, p. 1. [Online]. Available: http://portal.acm.org/citation.cfm?doid=1460877.14608999.
  13. R. Pang, M. Allman, V. Paxson, and J. Lee, "The devil and packet trace anonymization," vol. 36, no. 1, pp. 29-38 [Online]. Available: https://dl.acm.org/doi/10.1145/1111322.1111330.
  14. S. Geravand and M. Ahmadi, "Bloom filter applications in network security: A state-of-the-art survey," pp. 4047-4064, 2013. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1389128613003083.
  15. R. Patgiri, S. Nayak, and S. K. Borgohain, "Hunting the pertinency of bloom filter in computer networking and beyond: A survey," Journal of Computer Networks and Communications, vol. 2019, p. 2712417, Feb 2019. [Online]. Available: https://doi.org/10.1155/2019/2712417.