International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 7, July 2017

A Hybrid Approach for Intrusion Detection System

Hussam A. Al-Ameen

Buffer Overflow (BOF) have become the most common target for network-based attacks and on the other side many detection and prevention techniques have been developed to secure the systems and networks known Intrusion Detection Systems (IDS). The paper deals with the problem of BOF and proposes an IDS which is a combination of Host Intrusion Detection System (HIDS) and Network Intrusion Detection System (NIDS). It is designed to detect any attempt of BOF attack that use the Call/Jump Register technique depending on the use of set of available memory addresses of Call/Jump instructions for loaded DLL files uses them as a return addresses that point to the attacker malicious code being used to exploit the system. The proposed system generates two signature files, one for HIDS and the other for NIDS. The Monitoring and Detection Engine in the HIDS depend on On-Access-Scan technique to capture any file that contains the attack signature as they open and log them to a log file. Besides that, the Monitoring and Detection Engine in the NIDS depends on Snort system to sniff and capture any data packets in the network traffic that contain the attack signature and log them to another log file. An Analysis Engine applies a set of statistical operations and a Fuzzy Analysis System on log files in order to produce a set of reports in the form of PHP web sites that represent the analysis output that give the degree of BOF attack risk.

Keywords: HIDS, NIDS, Buffer Overflow

Edition: Volume 6 Issue 7, July 2017

Pages: 1149 - 1157

Share this Article

How to Cite this Article?

Hussam A. Al-Ameen, "A Hybrid Approach for Intrusion Detection System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20175385, Volume 6 Issue 7, July 2017, 1149 - 1157

40 PDF Views | 33 PDF Downloads

Download Article PDF

Similar Articles with Keyword 'HIDS'

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 1149 - 1157

A Hybrid Approach for Intrusion Detection System

Hussam A. Al-Ameen

Share this Article

Research Paper, Computer Science & Engineering, Sudan, Volume 6 Issue 9, September 2017

Pages: 343 - 347

Intrusion Detection Using Neural Network: A Literature Review

Asma Abbas Hassan, Alaa F. Sheta, Talaat M. Wahbi

Share this Article

Similar Articles with Keyword 'NIDS'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 1149 - 1157

A Hybrid Approach for Intrusion Detection System

Hussam A. Al-Ameen

Share this Article

Survey Paper, Computer Science & Engineering, Tanzania, Volume 3 Issue 10, October 2014

Pages: 747 - 751

A Survey of Intrusion Detection on Spontaneous Wireless Adhoc Networks

Thangaraj E, Arockia Jayadhas S

Share this Article

Research Paper, Computer Science & Engineering, Sudan, Volume 6 Issue 9, September 2017

Pages: 343 - 347

Intrusion Detection Using Neural Network: A Literature Review

Asma Abbas Hassan, Alaa F. Sheta, Talaat M. Wahbi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 80 - 85

Classification of Cloud Data using Bayesian Classification

Krunal Patel, Rohit Srivastava

Share this Article

Similar Articles with Keyword 'Buffer Overflow'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2651 - 2653

Survey on Congestion Control Mechanism for TCP

Tejashri P. Mane, Snehal Kanade

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 432 - 435

Minimizing Packet Loss Using Congestion Control Scheme for Video Streaming

A. ThamaraiSelvan, R. Sethu Raman

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 1149 - 1157

A Hybrid Approach for Intrusion Detection System

Hussam A. Al-Ameen

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1759 - 1762

Integrated Approach to Detect Vulnerabilities in Source Code

Monica Catherine S, Geogen George

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1147 - 1150

Enhance QoS of Lossy Wireless Sensor Network by In-Network Data Aggregation

Harshada Kupade, Madhav Ingle

Share this Article



Top