Skip to main content

Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones

  • Conference paper
  • First Online:
Computer Networks & Communications (NetCom)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 131))

Abstract

There is high demand to reduce the threat level in networks to ensure the data and services offered by them to be more secure. With the ever increasing number and diverse type of attacks, including new and previously unseen attacks, the effectiveness of an Intrusion Detection System is very important. Earlier works deal with the layered approach and conditional random fields (CRFs) for improving the efficiency and accuracy of an intrusion detection system. In this paper we developed an effective test suite using the layered CRFs. We set up different types of checks at multiple levels in each layer. Our framework examines various attributes at every layer in order to effectively identify any breach of security. Once the attack is detected, it is intimated through mobile phone to the system administrator for safe guarding the server system. We establish experimentally that the layered CRFs can be very effective in detecting intrusions when compared with the previously known techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (Canada)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (Canada)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

') var buybox = document.querySelector("[data-id=id_"+ timestamp +"]").parentNode var buyingOptions = buybox.querySelectorAll(".buying-option") ;[].slice.call(buyingOptions).forEach(initCollapsibles) var buyboxMaxSingleColumnWidth = 480 function initCollapsibles(subscription, index) { var toggle = subscription.querySelector(".buying-option-price") subscription.classList.remove("expanded") var form = subscription.querySelector(".buying-option-form") var priceInfo = subscription.querySelector(".price-info") var buyingOption = toggle.parentElement if (toggle && form && priceInfo) { toggle.setAttribute("role", "button") toggle.setAttribute("tabindex", "0") toggle.addEventListener("click", function (event) { var expandedBuyingOptions = buybox.querySelectorAll(".buying-option.expanded") var buyboxWidth = buybox.offsetWidth ;[].slice.call(expandedBuyingOptions).forEach(function(option) { if (buyboxWidth <= buyboxMaxSingleColumnWidth && option != buyingOption) { hideBuyingOption(option) } }) var expanded = toggle.getAttribute("aria-expanded") === "true" || false toggle.setAttribute("aria-expanded", !expanded) form.hidden = expanded if (!expanded) { buyingOption.classList.add("expanded") } else { buyingOption.classList.remove("expanded") } priceInfo.hidden = expanded }, false) } } function hideBuyingOption(buyingOption) { var toggle = buyingOption.querySelector(".buying-option-price") var form = buyingOption.querySelector(".buying-option-form") var priceInfo = buyingOption.querySelector(".price-info") toggle.setAttribute("aria-expanded", false) form.hidden = true buyingOption.classList.remove("expanded") priceInfo.hidden = true } function initKeyControls() { document.addEventListener("keydown", function (event) { if (document.activeElement.classList.contains("buying-option-price") && (event.code === "Space" || event.code === "Enter")) { if (document.activeElement) { event.preventDefault() document.activeElement.click() } } }, false) } function initialStateOpen() { var buyboxWidth = buybox.offsetWidth ;[].slice.call(buybox.querySelectorAll(".buying-option")).forEach(function (option, index) { var toggle = option.querySelector(".buying-option-price") var form = option.querySelector(".buying-option-form") var priceInfo = option.querySelector(".price-info") if (buyboxWidth > buyboxMaxSingleColumnWidth) { toggle.click() } else { if (index === 0) { toggle.click() } else { toggle.setAttribute("aria-expanded", "false") form.hidden = "hidden" priceInfo.hidden = "hidden" } } }) } initialStateOpen() if (window.buyboxInitialised) return window.buyboxInitialised = true initKeyControls() })()

Institutional subscriptions

Similar content being viewed by others

References

  1. Scarfone K, Mell P (2007) Recommendations of the National Institute of Standards and Technology: intrusion detection systems basics. http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf

  2. SANS Institute (2012) Intrusion detection FAQ. http://www.sans.org/resources/idfaq/

  3. Gupta KK, Nath B, Kotagiri R (2010) Conditional random fields for intrusion detection. Proceedings of IEEE dependable and secure computing

    Google Scholar 

  4. Anderson JP (2010) Computer security threat monitoring and surveillance. http://csrc.nist.gov/publications/history/ande80.pdf

  5. Agrawal R, Imielinski T, Swami A (1993) Mining association rules between sets of items in large databases. Proc ACM SIGMOD 22(2):207–216

    Article  Google Scholar 

  6. Gupta KK, Nath B, Kotagiri R (2006) Network security framework. Int J Comput Sci Netw Secur 6(7B):151–157

    Google Scholar 

  7. Gupta KK (2009) Robust and efficient intrusion detection systems. http://ww2.cs.mu.oz.au/ kgupta/files/phd-completion.pdf

  8. Gupta KK, Nath B, Kotagiri R (2010) Layered approach using conditional random fields for intrusion detection. Proceedings of IEEE dependable and secure computing

    Google Scholar 

  9. Amor NB, Benferhat S, Elouedi Z (2004) Naive Bayes vs. decision trees in intrusion detection systems. In: Proceedings of ACM symposium on applied, computing (SAC’04), pp 420–424

    Google Scholar 

  10. Abraham T (2001) IDDM: intrusion detection using data mining techniques. http://www.dsto.defence./gov.au/publications/2345/DSTO-GD-0286.pdf

  11. Gupta KK, Nath B, Kotagiri R (2010) Layered approach using conditional random fields for intrusion detection. IEEE Trans Depend Secure Comput 1(7):35–49

    Article  Google Scholar 

  12. Saravanan C, Shivsankar MV, Tamije Selvy P, Anto S (2012) An optimized feature selection for intrusion detection using layered conditional random fields with MAFS. Int J Mob Netw Commun Telematics 2(3):79–91

    Article  Google Scholar 

Download references

Acknowledgments

The authors sincerely thank the authorities of Supercomputer Education and Research Center, Indian Institute of Science for the encouragement and support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Bhakthavathsalam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Arpitha, M., Geetha, V., Gowranga, K.H., Bhakthavathsalam, R. (2013). Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones. In: Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Computer Networks & Communications (NetCom). Lecture Notes in Electrical Engineering, vol 131. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6154-8_53

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-6154-8_53

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-6153-1

  • Online ISBN: 978-1-4614-6154-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation

-