Browse > Article
http://dx.doi.org/10.9728/dcs.2018.19.4.711

An Improved Detection Performance for the Intrusion Detection System based on Windows Kernel  

Kim, Eui-Tak (Hauri Technical Laboratory)
Ryu, Keun Ho (Database/Bioinformatics Laboratory, School of Electrical and Computer Engineering, Chungbuk National University)
Publication Information
Journal of Digital Contents Society / v.19, no.4, 2018 , pp. 711-717 More about this Journal
Abstract
The breakthrough in computer and network has facilitated a variety of information exchange. However, at the same time, malicious users and groups are attacking vulnerable systems. Intrusion Detection System(IDS) detects malicious behaviors through network packet analysis. However, it has a burden of processing a large amount of packets in a short time. Therefore, in order to solve these problem, we propose a network intrusion detection system that operates at kernel level to improve detection performance at user level. In fact, we confirmed that the network intrusion detection system implemented at kernel level improves packet analysis and detection performance.
Keywords
Information Protection; Intrusion Detection System; Intrusion Protection System; Transport Driver Interface; Network Driver Interface Specification;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 In-Kyoung Kim, Eul-Gyu Im, "A Study on the Analysis Rule for Network Intrusion Detection System using Snort", The Journal of Korean Institute of Communications and Information Sciences, Vol. 2011, No. 6, pp. 656-658, Jun 2011.
2 Yong-Woo Jung, "A Study on Normalized Rules of Security System", M.S. dissertation, Soongsil, Seoul, Jun 2017.
3 Keon-Woong Kong, Yong-gwan Won, "Implementation of Encrypted Mail Program using SMTP and POP3", the Journal of Digital Contents Society, Vol. 18, No. 7, pp.1403-1409, Nov 2017.   DOI
4 Doo-Won Sik, "A Study on the False Positive detection method of Intrusion Prevention System Using SVM", M.S. dissertation, Sungkyunkwan, Seoul, Apr 2017.
5 Dong-Hee Han, "A Study on the Method for Selecting Snort Intrusion Detection Rules for Improvement of Efficiency and Reduction of False Positive", M.S. dissertation, Korea, Seoul, 2015.12.
6 Kedar Namjoshi, Girija Narlikar, "Robust and Fast Pattern Matching for IDS", 2010 Proceedings IEEE, 2010.03.
7 Suricata[Internet], Available: http://www.suricata-ids.org.
8 Ji-yong Han, In-bok Lee, Jung-Hee Han, "Accelerating PCRE Performance of Signature-based IDS", The Journal of Korean Instityte of Information Scientistics and Engineering : System and Theory, Vol. 40, No. 2, pp. 53-60, Feb 2013.
9 M. Alicherry, M. Muthuprasanna, and V. Kumar, "High speed pattern matching for network IDS/IPS", Proceedings of the 2006 14th IEEE International Conference on. IEEE, Santa Barbara, CA, Feb 2006.
10 M. Roesch, "Snort : Light weight Intrusion Detection for Networks", Proceedings of LISA '99:13th Systems Administration Conference, Seattle, WA, Nov 1999.
11 Kil-Ho Lee, "A Study of Network Intrusion Detection System using Snort", M.S., Gyeongsang, Aug 2017.
12 Security Tools, Security Tool Top 100[Internet], Available : http://www.sectools.org
13 Ho-Sung Jo, Sung-Il Oh, In-Bok Lee, Hee-Jin Park, Joong-Chae Na, "Development and Application of a Similarity Analysis Program for Snort-based Detection Rules", The Journal of Korean Institute of Next Generation Computing, Vol.11, No.1, pp. 32-43, Feb 2015.
14 K. Scarfone and P. Mell, "Guide to intrusion detection and prevention systems(IDPS)", NIST, Gaithersburg, MD, Special Publication 800-94, Feb 2007.
15 Seok-Jin Ug, Moon-Seok Choi, Ji-Myung Kim, Jong-Soon Park, "A Comparative Study on Performance of Open Source IDS/IPS Snort and Suricata", The Journal of Korea Society of Digital Industry and Information Management, Vol. 12, No. 1, pp. 89-95, Mar 2016.   DOI
16 Snort, Snort User Manual[Internet], Available : http://manual-snort-org.s3-wesite-us-east-1.
17 Jay Beale, James C, Foster Jeffery Posluns, Brian Caswell, "Snort 2.0 Magic Box", Acorn, 2003.
18 Wikiphedia, Intrusion Detection System[Internet], Available: https://en.wikipedia.org/wiki/Intrusion_detection_system.
19 Snort[Internet], Available : http://www.snort.org.
20 S. Chakrabarti, M. Chakraborty, and I. Mukhopadhyay, "Study of snort-based IDS", Proceedings of the International Conference and Workshop on Emerging Trends in Technology, ACM, 2010.
21 Myeong-Ki Jeong, Seong-Jin Ahn, Won-Hyung Park, "A Comparative Study on Function and Performance of Snort and Suricata", The Journal of Information and Security, Vol. 14, No 5, pp.3-8, Sep 2014.
22 Yong-Sik Jeon, "Cost-Based Optimizer Detection Tree configuration plan for performance improvement of Signature-Based IDS", M.S. dissertation, Korea, Seoul, 2017.05.