06Paper31101159IJCSISCameraReadypp 33-40
06Paper31101159IJCSISCameraReadypp 33-40
net/publication/239499071
CITATIONS READS
5 7,334
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Eugène C. Ezin on 21 May 2014.
Abstract—Intrusion Detection has become an integral part of users or external perpetrators. Some intrusion detection sys-
the information security process. The cost involved in protecting tems monitor a single computer, while others monitor several
network resources is often neglected when compared with the computers connected by a network.
actual cost of a successful intrusion, which strengthens the need to
develop more powerful intrusion detection systems. Many existing Intrusion detection systems detect intrusions by analyzing
systems for intrusion detection are developed in C, Objective-C, information about user activities from sources such as audit
Tcl, C++ programming languages. records, system tables, and network traffic summaries. In
In this paper, we design and develop a network intrusion short, intrusion detection systems can also be used to monitor
detection system using Java programming language. We simulate network traffic, thereby detecting if a system is being targeted
the land attack, the flooding attack and the death’s ping attack
to show the effectiveness of the proposed system in which packets by a network attack such as a denial of service attack.
in the network are captured online as they come on the network The primary aim of intrusion detection system is to protect
interface. the availability, confidentiality and integrity of crytical net-
Keywords-component—Intrusion Detection System (IDS), JpCap worked information systems. Intrusion detection systems are
library, Network Security. defined by both the method used to detect attacks and the
placement of the intrusion detection system on the network.
I. I NTRODUCTION The objective of an intrusion detection system is to provide
With the proliferation of networked computers and the data security and ensure continuity of services provided by a
Internet, their security has become a primary concern. This network [5].
rapid advancement in the network technologies includes higher Two major approaches are used by intrusion detection
bandwidths and ease of connectivity of wireless and mobile systems: misuse detection and anomaly detection.
devices. In 1980, Anderson proposed that audit trails should Intrusion detection system may perform either misuse de-
be used to monitor threats [1]. The importance of such data tection or anomaly detection and may be deployed as either a
was not been understood at that time and all the available network-based system or a host-based system. This description
system security procedures were focused on denying access to of intrusion detection system leads to four general groups:
sensitive data from an unauthorized source. Latter, Dorothy [2] misuse-host, misuse-network, anomaly-host, and anomaly-
proposed the concept of intrusion detection as a solution to the network.
problem of providing a sense of security in computer systems. Some intrusion detection systems combine qualities from
This intrusion detection model is independent of system, type all these categories by implementing both misuse and anomaly
of intrusion and application environment. detection, and are known in literature as hybrid systems [6].
Intrusion detection according to Bace is the process of Even though Gupta in [7] gives an overview on robust and
intelligently monitoring the events occuring in a computer efficient intrusion detection systems, the intrusion detection
system or network, analyzing them for signs of violations problem is a hard one since no security is absolutely guarantee
of the security policy [3]. In short, intrusion detection is the for ever.
process of monitoring computers or networks for unauthorized The goal of this paper is to propose a model for intrusion de-
entrance, activity, or file modification. Intrusion detection tection with three different positions for the intrusion detection
systems refer to those systems which are designed to monitor system using Java programming language. The Jpcap library
an agent’s activity to determine if the agent is exhibiting is used in the implementation. So doing, the overall system has
unexpected behavior. Intrusion detection model was proposed more chance to detect an attack. To show the effectiveness of
by Denning [2]. A more precise definition is found in [4] in the overall system, three different attacks are simulated.
which an intrusion detection system is a system that attempts The paper is organized as follows: section II presents
to identify intrusions, which we define to be unauthorized uses, different phases of an attack. Section III gives an overview on
misuses, or abuses of computer systems by either authorized the two approaches to intrusion detection. Section IV presents
33 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 9, No. 11, November 2011
some intrusion detection systems. Section V presents the such as a back door to a product to gain unauthorized access
design of the intrusion detection system we proposed through to information or to a system function at a later date.
subsection V-A which describes the functional components
of the authentification process. Subsection V-B describes the D. Inside Attack
functional description of the proposed system. Architectures An insider attack involves someone from inside, such as a
and possible locations of the proposed network intrusion disgruntled employee, attacking the network. Insider attacks
detection system are given in subsection V-D. A description can be malicious or not. Malicious insiders intentionally
of the plateform is given in section V-E while section V-F eavesdrop, steal, or damage information; use information in
describes the involved open source tools to realize the network a fraudulent manner; or deny access to other authorized users.
intrusion detection system. Section VI presents the global No malicious attacks typically result from carelessness, lack of
architecture. knowledge, or intentional circumvention of security for such
II. T YPES OF ATTACK reasons as performing a task.
Classes of attack might include passive monitoring of E. Close-In Attack
communications, active network attacks, close-in attacks, ex-
ploitation by insiders, and attacks through the service provider. A close-in attack involves someone attempting to get phys-
Information systems and networks offer attractive targets and ically close to network components, data, and systems in
should be resistant to attack from the full range of threat order to learn more about a network. Close-in attacks consist
agents, from hackers to nation-states. A system must be able of regular individuals attaining close physical proximity to
to limit damage and recover rapidly when attacks occur. There networks, systems, or facilities for the purpose of modifying,
are eleven types of attack namely: passive attack, active attack, gathering, or denying access to information. Close physical
distributed attack, insider attack, close-in attack, phishing proximity is achieved through surreptitious entry into the
attack, password attack, buffer overflow attack, hijack attack, network, open access, or both.
spoofing attack, exploit attack. One popular form of close-in attack is social engineering
in a social engineering attack, the attacker compromises the
A. Passive Attack network or system through social interaction with a person,
A passive attack monitors unencrypted traffic and looks through an electronic mail or phone. Various tricks can be
for clear-text passwords and sensitive information that can used by the individual to reveal information about the security
be used in other types of attacks. Passive attacks include of company. The information that the victim reveals to the
traffic analysis, monitoring of unprotected communications, hacker would most likely be used in a subsequent attack to
decrypting weakly-encrypted traffic, and turing authentifica- gain unauthorized access to a system or network.
tion information such as passwords. Passive interception of
network operations enables adversaries to see upcoming ac- F. Phishing Attack
tions. Passive attacks result in the disclosure of information or In phishing attack the hacker creates a fake web site that
data files to an attacker without the consent or knowledge of looks exactly like a popular site. The phishing part of the attack
the user. is that the hacker then sends an e-mail message trying to trick
the user into clicking a link that leads to the fake site. When
B. Active Attack
the user attempts to log on with their account information, the
In an active attack, the attacker tries to bypass or break into hacker records the username and password and then tries that
secured systems. This can be done through stealth, viruses, information on the real site.
worms, or Trojan horses. Active attacks include attempts to
circumvent or break protection features, to introduce malicious G. Password Attack
code, and to steal or modify information. These attacks are
mounted against a network backbone, exploit information In a password attack an attacker tries to crack the passwords
in transit, electronically penetrate an enclave, or attack an stored in a network account database or a password-protected
authorized remote user during an attempt to connect to an file. There are three major types of password attacks: a
enclave. Active attacks result in the disclosure or dissemination dictionary attack, a brute-force attack, and a hybrid attack.
of data files, deny of service, or modification of data. A dictionary attack uses a word list file, which is a list of
potential passwords. A brute-force attack is when the attacker
C. Distributed Attack tries every possible combination of characters.
A distributed attack requires that the adversary introduce
H. Buffer Overflow Attack
code, such as a Trojan horse or back-door program, to a trusted
component or software that will later be distributed to many Buffer overflow attack is produced when the attacker sends
other companies and users. Distribution attacks focus on the more data to an application than is expected. A buffer overflow
malicious modification of hardware or software at the factory attack usually results in the attacker gaining administrative
or during distribution. These attacks introduce malicious code access to the system in a command prompt or shell.
34 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 9, No. 11, November 2011
35 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 9, No. 11, November 2011
C. Hybrid Intrusion Detection Snort is an open-source project and it has an architecture mak-
The hybrid intrusion detection system is obtained by com- ing it possible to integrate new functionalities at the time of
bining packet header anomaly detection and network traffic compilation [17], [18].
anomaly detection which are anomaly-based intrusion detec- D. NIDS BRO
tion systems with the misuse-based intrusion detection system.
Snort is an example of an open-source project for hybrid Bro is an open source Unix based network intrusion de-
intrusion detection. The hybrid intrusion detection system is tection system [19]. It is a stand-alone system for detecting
said to be more powerful than the signature-based on its own network intruders in real-time by passively monitoring a
because it uses the advantages of anomaly-based approach for network link over which the intruder’s traffic transits. Bro is
detecting unknown attacks [9]. conceptually divided into an event engine that reduces a stream
of (filtered) packets to a stream of higher-level network events,
IV. P RESENTATION OF SOME I NTRUSION D ETECTION and an interpreter for a specialized language that is used to
S YSTEMS express a site’s security policy.
There are many implemented intrusion detection systems E. IDS Prelude
around the world. Sobirey web site [16] presents more than
Prelude has a modular architecture and is distributed. Mod-
ninety intrusion detection systems. Some are proprietary (free
ular, because its components are independent, and can be
or commercial) and others are open source. Commercial
easily updated. Distributed, because these independent com-
intrusion detection systems belong to specialized societies in
ponents interact with each other. This allows to have different
network security such as Cisco System, Computer Associates,
components installed on various machines and to reduce the
Intrusion.com, Network Associates, etc. In the following sub-
overloaded applications. These various components are the
sections, we will present some open source intrusion detection
probes and the managers. The probes can be of two types:
systems such as HIDS OSSEC, HIDS Samhain, NIDS Snort,
network or room. A probe network analyzes all the traffic, to
NIDS BRO, IDS Prelude. This choice is motivated by the fact
detect possible signatures’ attacks. The local probe ensures the
that intrusion detection system we developed is open source
monitoring of only one machine, and it analyzes the system’s
using Java technologies.
behavior to detect attempts of internal vulnerabilities. The
A. HIDS OSSEC probes announce the attempts of attacks by alarms. These
OSSEC which stands for open source security is an open alarms are received by the manager who interprets and stores
source host-based intrusion detection system. It performs log them.
analysis, file integrity checking, policy monitoring, rootkit V. D ESCRIPTION OF THE P ROPOSED D ESIGN OF
detection, real-time alerting and active response. It was ini- I NTRUSION D ETECTION S YSTEM
tially developed to analyze journal files on servers. Nowadays,
This description concerns the authentification process and
OSSEC is able to analyze different journal file formats such
the network intrusion detection system proposed.
as those of Apache, syslog, snort.
A. Functional Description of the Authentification Process
B. HIDS Samhain
The system administrator requests for connection to the
The Samhain host-based intrusion detection system (HIDS)
proposed network intrusion detection system. After three un-
provides file integrity checking and log file monitor-
successful tests the system is disconnected. The following
ing/analysis, as well as rootkit detection, port monitoring,
sequences must be carried out:
detection of rogue SUID executables, and hidden processes.
• the system presents the authentification form,
Samhain been designed to monitor multiple hosts with po-
• the administrator enters his/her login and password,
tentially different operating systems, providing centralized
• the system checks the login and the password,
logging and maintenance, although it can also be used as a
• the system allows the administrator to have an access to
stand-alone application on a single host. Samhain is an open-
source multiplatform application for POSIX systems (Unix, the proposed network intrusion detection or the system
Linux, Cygwin/Windows). doesn’t allow the administrator after three unfruitful tests.
Figure 1 presents the identification process of the system
C. NIDS Snort administrator.
Snort is the most commonly used signature-based intrusion
B. Functional Description of the NIDS Proposed
detection system and the most downloaded. It is a fast,
signature-based and open-source intrusion detection system When the authentification occurs successfully, the graphical
which produces alarms using misuse rules. It uses binary interface of the network intrusion detection system proposed
tcpdump-formatted files or plain text files to capture network is posted. The following sequences must be then carried out:
packets. Tcpdump is a software program that captures network • request for choice of an interface network by the admin-
packets from computer networks and stores them in tcpdump- istrator,
formatted files. Snort has a language to define new rules. • posting of the interfaces available on the system;
36 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 9, No. 11, November 2011
Demilitarized zone
37 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 9, No. 11, November 2011
after intrusions’ detection. on the host machine thanks to the method JpcapCap-
tor.getDeviceList(),
1 Application Programming Interface. • selecting of the network interface to be used by the
2 Java Development Kit. sniffer,
38 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 9, No. 11, November 2011
39 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 9, No. 11, November 2011
VIII. C ONCLUSION F URTHER W ORKS [10] K. Tan, “The application of neural networks to unix computer security,”
IEEE International Conference on Neural Networks, vol. 1, pp. 476–481,
In this work, we have proposed an intrusion detection 1995.
system implemented in Java. This system has been tested [11] H. S. Javitz and A. Valdes, “The sri ides statistical anomaly detector,”
IEEE Symposium on Research in Security and Privacy, pp. 316–376,
by simulating three types of attack: land attack, flooding 1991.
attack and death ping attack. The proposed system detects [12] S. Noel et al., Modern intrusion detection, data mining, and degrees
all these attacks correctly. The proposed network intrusion of attack guilt, in applications of data mining in computer security.
Kluwer Academic Publisher, 2002.
detection system is extensible and portable and many other [13] N. Debar et al., “A neural network component for an intrusion detection
functionalities can be implemented. Nevertheless, it presents systems,” in IEEE symposium on security and privacy, 1992, pp. 240–
some drawbacks. First the proposed system takes into account 250.
[14] L. M. Gassata, “The artificial immune model for network intrusion
only the scenario approach. The behavioral approach will be detection,” in First international workshop on the recent advances in
examined in the future. intrusion detection, 1998.
Evaluating an intrusion detection system is a difficult task. [15] J. Kim and P. Bentley, “The artificial immune model for network intru-
sion detection,” in Seventh European congress on intelligent techniques
Indeed, it can be difficult even impossible to identify the set and soft computing (EUFIT99), 1999.
of all possible intrusions that might occur at the site where [16] M. Sobirey. (2011, Jan.) Intrusion detection systems. [Online].
a particular intrusion detection system is employed. To start Available: http://www-rnks.informatik.tu-cottbus.de/sobirey/ids.html
[17] M. Roesch, “Snort lightweight intrusion detection for networks.”
with, the number of intrusion techniques is quite large [23]. [18] R. Russel, Snort intrusion detection 2.0. Rockland, MA: Syngress
Then, the site may not have access to information about Publishing, Inc, 2003.
all intrusions that have been detected in the past at other [19] D. Burgermeister and J. Krier. (2010, Dec.)
Système de détection d’intrusion. [Online]. Available:
locations. Also, intruders can discover previously unknown http://www.dbprog.developpez.com/securite/ids/IDS.pdf
vulnerabilities in a computer system, and then use new intru- [20] K. Fujii. (2007, Jan.) Jpcap tutorial. [Online]. Available:
sion techniques to exploit the vulnerablities. Another difficulty http://netresearch.ics.uci.edu/kfujii/Jpcap/doc/tutorial/index.html
[21] C. Thibaud, MySQL 5: installation, mise en oeuvre, administration et
in evaluating an intrusion detection system is that although it programmation. Edition Eyrolles, 2006.
can ordinary detect a particular intrusion, it may fail to detect [22] N. Cheswick and S. Bellovin, Firewalls and Internet Security: Repelling
some intrusion when the overall level of computing activity the Willy Hacker. Pearson Education Inc., 2003.
[23] P. G. Neumann and D. Parker, “A summary of computer misuse
in the system is high. This complicates the task of thoroughly techniques,” in 12th National Computer Security Conference, Baltimore,
testing the intrusion detection system. MD, 1989, pp. 396–407.
In our future work, we will also compare the performance [24] E. C. Ezin, “Implementation in java of a cryptosystem using a dynamic
huffman coding and encryption methods,” International Journal of
of the proposed network intrusion detection with already ex- Computer Science and Information Security, vol. 9, no. 3, pp. 154–159,
isting intrusion detection systems based upon the methodology 2011.
developed by Puketza [8]. We will also combine the proposed
intrusion detection system and the Java-based cryptosystem AUTHORS ’ PROFILES
using a dynamic huffman coding and encryption methods we Eugène C. Ezin received his Ph.D
developed in [24]. So doing, the security is reinforced to avoid degree with highest level of distinction
intruder to discover plaintext data. in 2001 after research works carried
out on neural and fuzzy systems for
ACKNOWLEDGMENTS speech applications at the International
We thank anonymous reviewers for their review efforts. We Institute for Advanced Scientific Studies
also appreciate comments from our colleagues. in Italy. Since 2007, he has been a
senior lecturer in computer science. He
R EFERENCES is a reviewer of Mexican International
[1] J. P. Anderson, “Computer security threat monitoring and surveillance,” Conference on Artificial Intelligence.
Fort Washington, Pennsylvania, James P Anderson Co, Tech. Rep., 1980. His research interests include neural network and fuzzy
[2] D. Denning, “An intrusion-detection model,” IEEE Transaction on systems, high performance computing, signal processing,
Software Engineering, vol. 13, no. 2, pp. 222–232, 1997.
[3] R. G. Bace, Intrusion Detection. Technical Publising, 1995.
cryptography, modeling and simulation.
[4] B. Mukherjee et al., “Network intrusion detection,” IEEE Network,
vol. 8, no. 3, pp. 26–41, 1994. Hervé Guy Akakpo received his
[5] K. Ramamohanarao et al., “The curse of ease of access to the internet,”
3rd International Conference on Information Systems Security.
MSc in computer science with highest
[6] N. Bashah et al., World Academy of Science, Engineering and Technol- level of distinction in 2011. He is cur-
ogy. World Academy of Science, 2005. rently employed at the Caisse Autonome
[7] K. K. Gupta, “Robust and efficient intrusion detection systems,” Ph.D.
dissertation, The University of Melbourne, Department of Computer
d’Amortissement. and affiliated to the
Science and Software Engineering, January 2009. Institut de Mathématiques et de Sciences
[8] N. J. Puketza et al., “A methodology for testing intrusion detection Physiques within the master program of
systems,” IEEE Transaction on Software Engineering, vol. 22, no. 10,
pp. 719–729, 1996.
computer science for tutoring the course
[9] M. A. Aydin et al., “A hybrid intrusion detection system design for on networking. His research interests include information
computer network security,” Computer and Electrical Engineering, system and network security.
vol. 35, pp. 517–526, 2009.
40 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
View publication stats