You are on page 1of 7

Intrusion Detection System: Survey & Analysis of

NIDS
Pragya Vashishtha#1, Riya Khandelwal$2, Anpurna Aggarwal%3
#1
UG,CSE,MITRC,Alwar,Rajasthan
vashishtha.pragya.2798@gmail.com
$2
UG,CSE,MITRC,Alwar,Rajasthan
riyakhandelwal0008@gmail.com
%3
UG,CSE ,MITRC,Alwar,Rajasthan
Anpurnaaggarwal05@gmail.com
Vinod Rampure
Assistant Professor,MITRC,Alwar,Rajasthan
Vinodrampure_cs@mitrc.ac.in

Abstract-It is very important to provide problems. IDS provide three important


a high level security to protect highly security functions; monitor, detect and
sensitive and private information. respond to unauthorized activities.
Intrusion Detection System is an Intrusion Detection System monitors the
essential technology in Network operations of firewalls, routers,
Security. This paper includes an management servers and files critical to
other security mechanisms.
overview of intrusion detection systems
Intrusion Detection System can make the
and introduces the reader to some
security management of system by non-
fundamental concepts of IDS expert staff possible by providing user
methodology. In this also discuss the friendly interface. Intrusion detection
primary intrusion detection techniques. systems usually provide the following
In this paper, we have included mainly Services:
network based intrusion detection  Observing and analysing computer
system. and/or network system activity.
 Audit the system configurations
and vulnerabilities.
Keywords:
 Evaluating the integrity of critical
system and data files.
I. INTRODUCTION  Estimating abnormal activities.

II. IDS TAXONOMY


Intrusion Detection is a key technique in
Information Security plays an important
role detecting different types of attacks and IDSs are divided into two broad
secures the network system. Intrusion categories: host-based
detection is the process of observing and (HIDS) and network-based (NIDS) .A
Analysing the events arising in a computer host-based IDS
or network system to identify all security Requires small programs (or agents) to be
installed on
Individual systems to be supervised. The A network-based intrusion detection
agents monitor the system (NIDS) is used to monitor and
operating system and write down data to analyse network traffic to protect a system
log files and/or trigger alarms. A network- From network-based threats where the data
based Intrusion Detection System Usually is traffic across the network. A NIDS tries
consists of a network application (or to detect malicious activities such as
sensor) with a Network Interface Card denial-of-service (Dos) attacks, port scans
(NIC) working in promiscuous mode and a and monitoring the network traffic attacks.
separate management of interface. NIDS includes a number of sensors to
IDS are placed on a network segment or monitors packet traffic, one or more than
boundary and monitor all traffic on that servers for NIDS management functions,
segment. The current trend in intrusion and one or more management relieves for
detection is to combine both host based the human interface. NIDS examines the
and network based information to develop traffic packet by packet in real time, or
hybrid systems that have more efficient. near to real time, for attempting to detect
intrusion patterns. The analysis of traffic
patterns to detect intrusions may be done
1.HOST BASED INTRUSION at the sensors, at the management servers,
DETECTION(HIDS): or combination of the both. These
network-based procedures are considered
the active component.

Host based intrusion detection (HIDS)


refers to intrusion detection that takes
place on a single host system. The data is
collected from an individual host system. 3.HYBRID INTRUSION DETECTION
The HIDS agent monitors activities such
as integrity of system, application action,
file changes, host based network traffic, The current trend in intrusion detection is
and system logs. By using common to combine both types host-based and
hashing tools, file timestamps, system network-based IDS to design hybrid
logs, and monitors system calls and the systems. Hybrid intrusion detection system
local network interface gives the agent has flexibility
insight to the present state of the local And it increases the security level. It
host. If there is any unauthorized change or combines IDS sensor locations and reports
activity is detected; it alerts the user by a attacks are aimed at particular segments or
pop-up, it alerts the central management entire network.
server, blocks the activity, or a
combination of the above three. The
decision should be based on the policy that
is installed on the local system. These
host-based procedures are considered the
passive component.

2. NETWORK BASED INTRUSION


DETECTION (NIDS):
based on audit data gathered over a period
of normal operation. Anomaly detection is
an important tool for fraud detection,
network based intrusion, and other unusual
events that have great significance but they
are hard to find. The importance of
anomaly is due to the fact that anomalies
in data translate to important actionable
information in a huge variety of
application domains. Anomaly detection is
also sometimes referred to as behaviour-
based detection because it associates with
variations from user behaviour. The
advantage of anomaly detection approach
is the ability to detect novel attacks or
unknown attacks based on audit data.

The main drawback of the anomaly


detection approach is those well-known
attacks may not be detected.

MISUSE DETECTION:
Fig: types of intrusion detection system
Misuse IDS trying to detect abnormal
behaviour by analysing the given traffic
and go with several rules based on
Analysis and comparison with the Rules
III. INTRUSION DETECTION
the system can notice any attacks, such as
APPROACHES
matching signature pattern. Misuse
detection is also sometimes referred to as
Signature-based detection because alarms
There are currently a variety of approaches
are generated based on particular attack
utilized to accomplish the desirable
signatures this kind of attack signatures
elements of intrusion detection system.
encompass particular traffic or activity that
There are two general approaches to
is based on known intrusive activity.
intrusion
Detection:
The advantage of misuse detection is the
 Anomaly detection ability to generate accurate result and
 Misuse detection having fewer false alarms. The
These approaches develop the core of disadvantage of misuse detection
several currently present intrusion approaches is that they will detect only the
detection techniques. known attacks.

ANOMALY DETECTION: IV. COMMON ATTACKS &


VULNERABILITY
Anomaly IDS trying to detect anomalies
when any difference occurs from the Most attack on threat is cyber security
normal system . Anomaly detection is attacks being perform today; it may
include silently sending all sort of
confidential data from your computer or
network to the attackers home base.

Current NIDS substantial amount of


human intervention and administrators for
an effective operation . Therefore for
network administrators to understand the
architecture of NIDS, and the well known
attacks and threats is very much essential.
In this section we will discuss well known
attacks, threats and vulnerabilities in the
end host operating system and protocols.

ATTACK TYPES

1 Confidentially
2 Integrity
3 Availability
4 Control
Fig- Architecture of Scanning Attack
V. ATTACKS DETECTED BY
NIDS 2 DOS ATTACKS

Till current research a number of attacks There are number of denial of services
can be detected by current generation of attack, such kind of attacks can cause
NIDS. Some are described as follows: significant economic damage or
completely shut downs the targets to
1 SCANNING ATTACKS disrupt the services especially ecommerce
business slow down by denying authorized
In such attacks, an attacker sends different users access.
kinds of packets or information to probe a
system or network that they want to 3 PENETRATION ATTACKS
exploit. Now the response for these probe
packets are analysed to determine the Generally penetration attacks exploit
characteristics of the target system. certain flaws in the software which allows
the attacker to install viruses and malware
in the system as he gains an unauthorized
control of the system.

VI. ROLE OF NIDS IN


COMBATING ATTACKS

AS we know an NIDS can detect attacks,


additionally they provide numbers of keys
to find the nature of the attack, origin and
propagation characteristics. Also most
NIDS often reports the location of
attackers or hacker i.e. from where the
attack has been triggered, however it is not
enough information as a smart attacker
often changes the IP address in the attack VIII. HONEYPOT (HP)
packets, called IP address spoofing. The IP
address reported by the NIDS had a key HP is mainly a heuristic approach and is
concept that concept that determines if the based on concept of bait and trap; basically
attack requires the reply messages to be it is just a deception. In computer
sent or not. terminology, a honey pot is a computer
security mechanism set to detect, deflect,
In modern NIDS the route that an attack or, in some manner, counteract attempts at
packet have taken gets also reported, this unauthorised use of information systems.
route information contains key information Generally, a honey pot consists of data that
that can be used to trace the attacker or appears to be a legitimate part of the site,
hacker. but is actually isolated and monitored, and
that seems to contain information or a
Also with enhancement modern NIDS resource of value to attackers, who are
have started to include the capability to then blocked.
aggregate the attacks reports into a smaller
number of subsets that is much easy to Generally speaking HP is deception based
examine. approach to detect action of a deceitful
enemy (the intruder or attacker). HP
VII. FUTURE OF NIDS concept has attracted much attention over
the internet and there are numerous sites
Performance is one of the key challenges dedicated to this concept.
of NIDS. Inspection of deep packets in
most NIDS, limits the NIDS performance. Nevertheless, industry sector is very
In future present system can easily scale to attracted by this concept. The overall idea
multigigabits throughputs which enhance behind the HP technology is to lay a trap
the system performance. Analysis and and bait and wait for the hunt to fall into it.
correlation is one more challenge of NIDS Here HP is used as a supplement to the
in future. The main issue is to advanced IDS to detect the intrusion where IDS was
the system and replace all human operation unable to do so. In this way, the
work with full automation. probability of the undetected attacks is
reduced.
Use of encryption increasing and
necessitates on the host system where the Nowadays, attackers or intruders aware of
data can be encrypted. At the centre of the the HP technology try to avoid the HP’s or
model lie a familiar concept – the even take advance of them. For this they
management station, that is similar to the have implemented different tools, once
NIDS console. Mounting security also detected, they disengage the HP. But due
concerned, host machine need to aid the to smart intruders as the HP technology
central NIDS component in looking for the improves, the anti-HP also does.
behaviour (network or system) that is
malicious or abnormal. Therefore a never ending battle is already
started, so there is need to improve the HP
There is one more aspect that requires approach otherwise it will become a weak
attention in future – standard concerning point in the system. Also according to
the NIDS reporting. Some update will be latest researches the authors propose a
in future like NIDS protocol will be design for a dynamic honey pot, capable of
established and standardised reporting changing configuration to match the
format will become requirement.
dynamic and even changing environment ports. A NIDS can also be used to enforce
of a network. network wide access controls.

IX. STRENGTH & LIMITATION (5) Anomaly based NIDS can also recognize,
with a certain false positive probability, new
OF NIDS
attacks and abnormal patterns in the network
traffic, whose signatures are not yet generated.
As we till studied NIDS have become This will alert the network administrator
extremely valuable in enhancing the early, and potentially reduce the damage
security of the network and end host, caused by the new attack.
however they have number of key
overcomes, therefore it is very much
essential for a network administrators to be 2 Limitations of NIDS
aware of both strength and weakness.

(1) A MERE WORKAROUND:


NIDS today have become extremely valuable A number of researchers have argued that a
in enhancing the security of the networks and NIDS is more or a less a workaround for the
end hosts; they however have a number of key flaws and weak or missing security
drawbacks. In the deployment of NIDS, it mechanisms in an operating system, an
therefore is important for the network application, and/or a protocol.
administrator to be aware of its strengths and
limitations. In the section we discuss these (2) FALSE POSITIVES:
properties: NIDS comes with a bane, i.e. false positives. A
false positive is an event when a NIDS falsely
1 STRENGTHS OF NIDS raises a security threat alarm for harmless
traffic. Signatures can be tuned precisely to
NIDS can perform the following functions to reduce such false positives, however fine
enhance the security. signatures create a significant performance
bottleneck, which is the next limitation of
(1)Measurements and analysis of typical and NIDS. Current Anomaly
atypical user behaviour. For example an based algorithms lead to even higher false
anomaly based NIDS is capable of detecting positives.
high volume traffic flows, flash crowds, load
imbalance in the network, sudden changes in (3) PERFORMANCE ISSUES:
demand of a port usage, sudden surge of traffic Current signature based NIDS systems use
from/to a specific host, etc . regular expressions signatures which creates a
significant performance bottleneck. In order to
(2) Detection of known worms, viruses, and reduce false positives long signatures are
exploitation of a known security hole. required which further reduces the
Signature based NIDS can detect these events performance.
with fairly high degree of accuracy. An The data throughput of current NIDS systems
appropriate signature will also ensure a low is limited to a few gigabits per second.
false positive probability.
(4) ENCRYPTION:
(3) Some advanced NIDS systems also enable The ultimate threat to the very existence of the
recognitions of patterns of system events that signature based NIDS systems is the
correspond to a known security threat. increasing use of data encryption. Everybody
dreams to encrypt their data before
(4) Enforcement of the security policies in a transmission. Once the packet payloads are
given network. For example a NIDS can be encrypted, the existing signatures will become
configured to block all communication completely useless in identifying the
between certain sets of IP addresses and or anomalous and harmful traffic.
(5) NEW AND SOPHISTICATED Additionally there has been an increase in
ATTACKS: polymorphic worms which can automatically
Commercial NIDS which are signature based change their propagation characteristics
are unable to detect new attacks whose thereby effectively changing their signatures.
signatures are not yet devised. Anomaly based Such worms also pose a critical threat to the
NIDS can detect such attacks but due to the current NIDS.
limitations of the current anomaly detection.
Algorithms, an intelligent attacker can always X. CONCLUSION
develop attacks that remain undetected.
We have studied the intrusion detection
(6) HUMAN INTERVENTION: system, and also analysed Network based
Almost all NIDS systems require a constant
intrusion detection system. We also have
human supervision, which slows down the
detection and the associated actions. Some surveyed about limitations, strengths,
recent systems such as Network Intrusion future
Prevention Systems (NIPS) can automatically Scope of network based intrusion detection
take system, and honey pot (HP) is mainly a
pre-programmed actions but these are limited heuristic approach and is based on concept
only to the well known attacks. of bait and trap.

(7) EVASION OF SINATURES:

A number of researchers have argued that it is


not difficult for an attacker to evade a
signature.
REFERENCE Coimbatore Doctoral Research Scholar,
Manonmaniam Sundaranar University,
[1] International Journal of Advanced Tirunelveli, India1M.Phil. Scholar,
Research in Computer and Department of Computer Science, Dr. N.G.P.
Communication Engineering Vol. 2, Issue 4, Arts and Science College, Coimbatore,
April 2013 India2Doctoral Research Supervisor, Assistant
Professor, PG & Research Department of
[2] R. Sommer, V. Paxson, , "Enhancing Computer Science,Government Arts College,
Byte-Level Network Intrusion Detection Coimbatore, India3
Signatures with
Context," ACM conf. on Computer and [6] Research on Intrusion Detection and
Communication Security, 2003, pp. 262--271. Response:A Survey
citeseer.ist.psu.edu/sommer03enhancing.html Peyman Kabiri and Ali A. Ghorbani
(Corresponding author: Ali A. Ghorbani)
[3] A. Lakhina, et al., "Mining Anomalies
Using Traffic Feature Distributions," Proc.
ACMSIGCOMM 2005.
www.sigcomm.org/sigcomm2005/paper-
LakCro.pdf

[4] Survey of Current Network Intrusion


Detection Techniques
Sailesh Kumar, sailesh@arl.wustl.edu//
[5] Intrusion Detection Systems: A Survey
and Analysis of Classification Techniques
V. Jaiganesh 1, S. Mangayarkarasi 2, Dr. P.
Sumathi 3
Assistant Professor, Department of Computer
Science, Dr. N.G.P Arts and Science College,

You might also like