We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Role of AES and DES based Heartbeat Events for Enhancing Fault Tolerance of Intrusion Detection System

Published on None 2011 by Perminder Kaur, Dhavleesh Rattan, Amit Kumar Bhardwaj
journal_cover_thumbnail
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET - Number 1
None 2011
Authors: Perminder Kaur, Dhavleesh Rattan, Amit Kumar Bhardwaj
5dc77fa6-a2d2-4a6e-bfc9-16a2b9bd84da

Perminder Kaur, Dhavleesh Rattan, Amit Kumar Bhardwaj . Role of AES and DES based Heartbeat Events for Enhancing Fault Tolerance of Intrusion Detection System. International Conference and Workshop on Emerging Trends in Technology. ICWET, 1 (None 2011), 15-21.

@article{
author = { Perminder Kaur, Dhavleesh Rattan, Amit Kumar Bhardwaj },
title = { Role of AES and DES based Heartbeat Events for Enhancing Fault Tolerance of Intrusion Detection System },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { None 2011 },
volume = { ICWET },
number = { 1 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 15-21 },
numpages = 7,
url = { /proceedings/icwet/number1/2060-aca84/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A Perminder Kaur
%A Dhavleesh Rattan
%A Amit Kumar Bhardwaj
%T Role of AES and DES based Heartbeat Events for Enhancing Fault Tolerance of Intrusion Detection System
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET
%N 1
%P 15-21
%D 2011
%I International Journal of Computer Applications
Abstract

Proliferation of heterogeneous network systems and increasing usage of Internet makes network security issue to be more and more important. Intrusion detection systems (IDS) are increasingly a key part of system defense, often operating under a high level of privilege to achieve their purposes. In accordance with the increasing importance of intrusion detection systems (IDS), users justifiably demand the trustworthiness of the IDS. However, IDS themselves are prone to various attacks and it becomes the natural primary target of hostile attacks with the aim of disabling the detection feature and allowing an attacker to operate without being detected. This paper suggests that intrusion detection system (IDS) must be fault tolerant; otherwise, the intruder may first subvert the IDS then attack the target system at will. Making an IDS fault tolerant [2] is a challenging task. The aim of this research paper is to enhance the fault tolerance of IDS using AES and DES based heart beat events. Brute Force attack has been simulated and the effectiveness of encrypted heartbeat event based fault tolerance for Intrusion Detection System is evaluated.

References
  1. B. Forouzan, 2009. “Data Communications and Networking 4th Ed.”, Tata McGraw Hill, 2009.
  2. C. Krugel, and, T. Toth 2000. “A Survey On Intrusion Detection Systems”, Technical Report, Technical University of Vienna, Version 1.0, December-2000.
  3. D. Curry and H. Debar 2003. Intrusion Detection Message Exchange Format. http:// www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-10.txt. August 2003.
  4. Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader, Mohie Mohamed Hadhoud, 2008. “Performance Evaluation of Symmetric Encryption Algorithms”, International Journal Of Computer Science and Network Security, Vol 8, No.12, pp.280-286, Dec 2008.
  5. Dong Yu and Frincke, S. 2004. “Towards Survivable Intrusion Detection System”, Proceedings of the 37th Hawaii International Conference on System Sciences, Vol 9, 2004
  6. D. Zamboni, 2001. “Using Internal Sensors For Computer Intrusion Detection”, Phd. Thesis, Purdue University, Aug. 2001.
  7. E. H. Spafford, and D. Zamboni, 2000. “Intrusion detection using autonomous agents”, Computer Networks, 34(4):547– 570, October 2000.
  8. Federal Information Processing Standards Publication 197 Announcing the “ADVANCED ENCRYPTION STANDARD” (AES), November 26, 2001.
  9. G. H. Kim, and E. H. Spafford, 1994. “The design and Implementation of Tripwire: A File System Integrity Checker”, Proc. Conference on Computer and Communications Security,Vol 2, pp. 18-29, November 1994.
  10. H. Debar, 2002. “An Introduction to Intrusion Detection Systems”, Proceedings of Connect’2000, Version 1.0, 2002.
  11. I. Buckley, and E.B. Fernandez, 2009. “Three Patterns For Fault Tolerance”, OOPSLA Mini PloP Workshop, 2009.
  12. I. M. Hegazy, T. Al-Arif, Z. T. Fayed and H. M. Faheem, 2003. “A multi-agent based system for intrusion detection”, IEEE Potentials, 22:28–31, October/November 2003.
  13. J. Daemen, and, V. Rijmen 2001. “Rijndael: The Advanced Encryption Standard. D r. Dobb's Journal”, March 2001, pp. 137-139.
  14. J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. lsacoff, E. Spafford, and D. Zamboni, 1998. “Architecture for Intrusion Detection using Autonomous Agents”, COAST Technical Report, COAST Laboratory, Purdue University,1998.
  15. K.N. Levitt, and S. Cheung, 2000. “Common Techniques in Fault-Tolerance and Security”, Proc. of the Dependable Computing for Critical Applications 4, pp. 373-377, 4-6 Jan. 2000.
  16. Lindonete Siqueira and Zair Abdelouahab, 2006. “A Fault Tolerance Mechanism for Network Intrusion Detection System based on Intelligent Agents (NIDIA)”. Proc. The Fourth IEEEWorkshop on Software Technologies for Future Embedded and Ubiquitous Systems, and the Second International Workshop on Collaborative Computing, Integration, and Assurance (SEUS-WCCIA'06) , Vol 00, pp. 49-54, 2006.
  17. Liwei Kuang and Mohammad Zulkernine 2008. An “Intrusion-Tolerant Mechanism for Intrusion Detection Systems”, Proc. 2008 Third International Conference on Availability, Reliability and Security, pp.319-326, 2008.
  18. M. Jahnke, 2002. “An Open and Secure Infrastructure for Distributed Intrusion Detection Sensors”. Proceedings of the NATO Regional Conference on Military Communications and Information Systems RCMCIS 2002, 9-11 October 2002. P. Baskerville, 2006. “Intrusion Prevention Systems: How Do They Prevent Intrusions?”, Master Thesis, University of Otago, Dunedin, New Zealand, March 2006.
  19. Pabitra Mohan Khilar, Jitendra Kumar Singh, Sudipta Mahapatra, 2008. “Design and Evaluation of a Failure Detection Algorithm for Large Scale Ad Hoc Networks Using Cluster Based Approach”, Proc.2008 International Conference on Information Technology , Vol 00, pp.153-158, 2008.
  20. R. Lemos, and J. L. Fiadeiro, 2002. “An Architectural Support for Self-Adaptive Software for Treating Faults”, Proceedings of the 1st ACM SIGSOFT Workshop on Self-Healing Systems, pp. 39-42, 2002.
  21. R. .Shashikumar and L.C.S. Gouda, 2009 ,” Self-Healing Reconfigurable FPGA Based Fault Tolerant Security Model for Shared Internet Resources” IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009
  22. S. Cheung, 1999. “An Intrusion Tolerance Approach for Protecting Network Infrastructures”, Ph.D. Dissertation, University of California, Davis, September 1999.
  23. S. Sidiroglou, O. Laadan, C. R. Perez, N. Viennot, J. Nieh, and A. D. Keromytis, 2009. “ASSURE: Automatic Software Self-Healing Using Rescue Points”, Proc. Of the 14th ACM International conference on Architectural support for programming languages and operating systems, pp. 37-48, 2009.
  24. T. Schluessler, P. Rajagopal, “OS Independent Run-Time System Integrity Services”, Research Paper, IT Innovation and Research, Intel Corporation, Nov. 2005.
  25. V. Chatzigiannakis, G. Androulidakis, M. Grammatikou, and B. Maglaris, 2004. “A Distributed Intrusion Detection Prototype using Security Agents”, Workshop of the HP OpenView University Association, 2004.
  26. W. Stallings, 2005. “Cryptography and Network Security” 4th Ed, ' Prentice Hall, 2005,PP. 58-309 .
  27. W.T. Work, 2003. “Intrusion Detection Systems- What are they and How do they work?”, Technical Report, June 2003.
  28. Y.P. Shen, W.T. Tsai, S. Bhattacharya, and T Liu, “Attack Tolerant Enhancement of Intrusion Detection Systems”, Proc. 21st Century Military Communications Conference, Vol 1, pp. 425-429.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Heartbeat Message Fault tolerance Integrity Checking AES DES