Generalized Evidential Processing in Multiple Simultaneous Threat Detection in UNIX

نویسندگان

  • Zafar Sultan
  • Paul Wing Hing Kwan
چکیده

In this paper, a hybrid identity fusion model at decision level is proposed for Simultaneous Threat Detection Systems. The hybrid model is comprised of mathematical and statistical data fusion engines; Dempster Shafer, Extended Dempster and Generalized Evidential Processing (GEP). Simultaneous Threat Detection Systems improve threat detection rate by 39%. In terms of efficiency and performance, the comparison of 3 inference engines of the Simultaneous Threat Detection Systems showed that GEP is the better data fusion model. GEP increased precision of threat detection from 56% to 95%. Furthermore, set cover packing was used as a middle tier data fusion tool to discover the reduced size groups of threat data. Set cover provided significant improvement and reduced threat population from 2272 to 295, which helped in minimizing the processing complexity of evidential processing cost and time in determining the combined probability mass of proposed Multiple Simultaneous Threat Detection System. This technique is particularly relevant to on-line and Internet dependent applications including portals. broken the existing security measures and have stolen million dollar information and damaged the IT infrastructure. The increasing complexity of the web portals and internet architecture has simply widened and opened another area of security challenges for the whole IT industry. In order to protect organizations securities in terms of critical business and personal data, IT industry has to keep on strengthening their efforts to develop intrusion detection system. As a result, organizations need to spent bilDOI: 10.4018/jwp.2010040105 52 International Journal of Web Portals, 2(2), 51-67, April-June 2010 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. lion of dollar just for securing and smooth run of their business data over the internet. For example Microsoft spent $1.2 billion to stop Sapphire/Slammer worm in 2003 (Ma, 2001; Spafford, 1991). Business dependence on Internet-based services, and Internet-facing platforms such as enterprise portals, significantly increase the prospect of concerted security attacks. In spite of all these security measures and highly recommended Intrusion Detection Systems, hackers still continuously breaking companies securities, exploiting system weaknesses and perform illegal functions such as stealing important information, business secrets, damaging data or systems etc. etc. The biggest challenges in the security fields are the types of attack, their point of origin and the quantity of damage and of course to identify attack and block it in time is the most demanding aspect for the IT industry (Braun, 2000; Siaterlis & Maglaris, 2004). Due to complexity of the UNIX applications infrastructure and Network architecture and implementation of multiple monitoring systems, false alarms have really become a big headache for the large companies. Millions of dollars have been spent just to build monitoring infrastructure but there does not seem to be any solution to stop false positive and false negatives. In general most of the Intrusion Detection Systems check the application layer, data layer and network layer data based on pattern matching with the existing situations of the processes and systems attributes. However, it is quite difficult to track an attacker if he / she just penetrate security and then keep steeling business data for months and months until new security updates find this attack but it is then too late. Damage has already been done. Looking into these facts, it looks a continuous battle between security implementers and hackers. But this is well known fact that an advancement of Intrusion Detection Systems have certainly reduced the number of security violation incidents and it has become more difficult for hackers to penetrate any IT systems that is well protected and secured using advance implementations of firewalls, intrusion detection system and monitoring systems (Bendjebbour et al., 2001; Hall, 1992). The emphasis of our research is the experimental evaluation of the simultaneous multiple threat detection system using Multi-sensor data fusion, its various approaches and techniques in UNIX environments. Our research will help in building multiple simultaneous threat detection system for computer security in general and for web based applications, web portals and internet applications of UNIX environments in particular. The main target of this paper is an advance step to use Dempster Shafer, Weighted Dempster Shafer and Generalized Evidential Processing (GEP) theory for Multi-sensor data fusion whilst in our previous research experiment, We used only Dempster Shafer and weighted Dempster Shafer for data fusion. Therefore, in this paper we will provide numerical comparisons between Dempster Shafer, Weighted Dempster Shafer and Generalized Evidential Processing and compare their efficiency and performance. 2. existinG tHreat deteCtion approaCHes in unix Parametric / non parametric techniques like Bayesian, Dempster Shafer, fuzzy rule and Kalman Filter are the most predominated techniques used for multiple threat detection in UNIX (Braun, 2000; Grocholsky, Makarenko, & Durrant-Whyte, 2003; Wu, Siegel, Stiefelhagen, & Yang, 2002). Theory of Set Cover, Chapman-Kalmogorov prediction model and method of least squares have also been used as an integral model with Bayesian, Dempster Shafer, Extended Dempster and GEP (Koks & Challa, 2005). Intrusion Detection Systems fetch data from system network layer, log files and other monitoring files. Data may be sniffer’s packets; sys log files, SNMP traces, system messages and other similar activities of the network. The existing IDS monitoring and alarming system provide good security measures against most 15 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the publisher's webpage: www.igi-global.com/article/generalized-evidential-processingmultiple-simultaneous/44696

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiple Simultaneous Threat Detection in UNIX Environment

Although UNIX is considered a very stable and secure platform, the development of Intrusion Detection Systems (IDS) is essential as current and future generations of hackers are continuously attempting to undermine its integrity. The empirical experiment of multiple simultaneous threat detection system proved that use of hybrid data fusion model of Bayesian, Dempster Shafer and extended Dempste...

متن کامل

طراحی و پیاده‌سازی سامانۀ بی‌درنگ آشکارسازی و شناسایی پلاک خودرو در تصاویر ویدئویی

An automatic Number Plate Recognition (ANPR) is a popular topic in the field of image processing and is considered from different aspects, since early 90s. There are many challenges in this field, including; fast moving vehicles, different viewing angles and different distances from camera, complex and unpredictable backgrounds, poor quality images, existence of multiple plates in the scene, va...

متن کامل

A Novel Multi-user Detection Approach on Fluctuations of Autocorrelation Estimators in Non-Cooperative Communication

Recently, blind multi-user detection has become an important topic in code division multiple access (CDMA) systems. Direct-Sequence Spread Spectrum (DSSS) signals are well-known due to their low probability of detection, and secure communication. In this article, the problem of blind multi-user detection is studied in variable processing gain direct-sequence code division multiple access (VPG D...

متن کامل

Performance of Target Detection in Phased-MIMO Radars

In this paper, the problem of target detection in phased-MIMO radars is considered and target detection performance of phased-MIMO radars is compared with MIMO and phased-array radars. Phased-MIMO radars combine advantages of the MIMO and phased-array radars. In these radars, the transmit array will be partitioned into a number of subarrays that are allowed to overlap and each subarray transmit...

متن کامل

The Mechanical Design of Drowsiness Detection Using Color Based Features

This paper demonstrates design and fabrication o f a mechatronic system for human drowsiness detection. This system can be used in multiple places. For example, in factories, it is used on some dangerous machinery and in cars in order t o prevent the operator o r driver from falling asleep. This system is composed of three parts: (1) mechanical, (2) electrical and (3) image processing system. A...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJWP

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2010