Intrusion Detection and Vulnerability Analysis with Temporal Relationalship

Authors

  • T. Krishnakaarthik Assistant Professor, Department of Information Technology, Nandha College of Technology, Erode, Tamil Nadu, India. Author
  • K.C. Rajavenkatesswaran Assistant Professor, Department of Information Technology, Nandha College of Technology, Erode, Tamil Nadu, India Author
  • Dr.S. Nandagopal Professor, Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamil Nadu, India. Author
  • Dr.P. Saveetha Department of Information Technology, Nandha College of Technology, Erode, Tamil Nadu, India. Author

DOI:

https://doi.org/10.61841/4n3fh985

Keywords:

Intrusion Detection, Attack Ramification, Vulnerability Analysis, Temporal Dependency Network and Dynamic Bayesian Network

Abstract

 The network attacks are discovered using the Intrusion Detection Systems (IDS). Anomaly, signature and compound attack detection schemes are employed to fetch malicious data traffic activities. The attack impact analysis operations are carried out to discover the malicious objects in the network. The system objects are contaminated with process injection or hijacking. The attack ramification model discovers the contaminated objects. The dependency networks are build to model the information flow over the objects in the network. The dependency network is a directed graph build to indicate the data communication over the objects. The attack ramification models are designed with intrusion root information. The attack ramifications are applied to identify the malicious objects and contaminated objects. The attack ramifications are discovered with the information flows from the attack sources. The Attack Ramification with Bayesian Network (ARBN) scheme discovers the attack impact without the knowledge of the intrusion root. The probabilistic reasoning approach is employed to analyze the object state for ramification process. The objects lifetime is divided into temporal slices to verify the object state changes. The system call traces and object slices are correlated to construct the Temporal Dependency Network (TDN). The Bayesian Network (BN) is constructed with the uncertain data communication activities extracted from the TDN. The attack impact is fetched with loopy belief propagation on the BN model. The network security system is build with attack impact analysis and recovery operations. Live traffic data analysis process is carried out with improved temporal slicing concepts. Attack Ramification and Recovery with Dynamic Bayesian Network (ARRDBN) is build to support attack impact analysis and recovery tasks. The unsupervised attack handling mechanism automatically discovers the feasible solution for the associated attacks. 

Downloads

Download data is not yet available.

References

[1] M.-W. L. DING-SOU CHEN and J. LIU, “Isolating multiple sensor faults based on self-contribution plots

with adaptive monitoring,” China Steel Technical Report, no. 24, pp. 64–73, 2011.

[2] V. Reppa, M. Polycarpou, and C. Panayiotou, “Decentralized isolation of multiple sensor faults in largescale interconnected nonlinear systems,”, IEEE Transactions on Automatic Control, vol. 60, no. 6, pp.

1582–1596, June 2015.

[3] D. Fragkoulis, G. Roux, and B. Dahhou, “A global scheme for multiple and simultaneous faults in system

actuators and sensors,” in Systems, Signals and Devices, 2009. 6th International Multi-Conference on,

March 2009, pp. 1–6.

[4] L. Mhamdi, H. Dhouibi, N. Liouane, and Z. Simeu-Abazi, “Multiple fault diagnosis using mathematical

models,” in Control Conference (ASCC), 2013 9th Asian, June 2013, pp. 1–6.

[5] C.-C. Li and J.-C. Jeng, “Multiple sensor fault diagnosis for dynamic processes,” ISA Transactions, vol. 49,

no. 4, pp. 415 – 432, 2010.

[6] I. Issury and D. Henry, “A methodology for multiple and simultaneous fault isolation,” in Control

Conference (ECC), 2009 European, Aug 2009.

[7] B. Pourbabaee, N. Meskin, and K. Khorasani, “Sensor fault detection, isolation, and identification using

multiple-model-based hybrid kalman filter for gas turbine engines,” IEEE Transactions on Control Systems

Technology, vol. 24, no. 4, pp. 1184–1200, July 2016

[8] P. Arpaia, C. Manna, and G. Montenero, “Ant-search strategy based on likelihood trail intensity

modification for multiple-fault diagnosis in sensor networks,” Sensors, IEEE, vol. 13, no. 1, pp. 148–158,

Jan 2013.

[9] A. Sharma, H. Chen, M. Ding, K. Yoshihira, and G. Jiang, “Fault detection and localization in distributed

systems using invariant relationships,” in Dependable Systems and Networks (DSN), 2013 43rd Annual

IEEE/IFIP International Conference on, June 2013, pp. 1–8.

[10] Z. Du and X. Jin, “Multiple faults diagnosis for sensors in air handling unit using fisher discriminant

analysis,” Energy Conversion and Management, vol. 49, no. 12, pp. 3654 – 3665, 2008.

[11] Yuan Yang, Zhongmin Cai, Chunyan Wang and Junjie Zhang, “Probabilistically Inferring Attack

Ramifications Using Temporal Dependency Network”, IEEE Transactions on Information Forensics and

Security, Volume 13, Issue 11, 2018.

[12] Muhammad Ejaz Ahmed, Saeed Ullah and Hyoungshick Kim, “Statistical Application Fingerprinting for

DDoS Attack Mitigation”, IEEE Transactions on Information Forensics and Security, Volume: 14 , Issue: 6,

June 2019.

[13] Alippi.C, S. Ntalampiras and M. Roveri, “Model-free fault detection and isolation in large-scale cyberphysical systems,” IEEE Trans. Emerg. Topics Comput. Intell., vol. 1, no. 1, pp. 61–71, Feb. 2017.

[14] Prakash, S. and Vijayakumar, M., “An effective network traffic data control using improved Apriori rule

mining,” Circuits and Systems, Issue 10, Vol. 07, pp. 3162-3173, June 2016.

[15] Sureshkumar V S, Chandrasekar A,” Fuzzy-GA Optimized Multi-Cloud Multi-Task Scheduler For Cloud

Storage And Service Applications” International Journal of Scientific & Engineering Research, Vol.04,

Issue.3,pp-1-7, 2013.

[16] Preethi, B.C. and Vijayakumar, M. “ A novel Cloud Integration Algorithm(CIA) for Energy Efficient High

Performance Computing Applications in Big Data Multimedia Applications”, Romanian Journal of

Information Science and Technology, vol. 2, no.1, pp. 1-11, March 2018.

[17] Vijayakumar M, Prakash s, “An Improved Sensitive Association Rule Mining using Fuzzy Partition

Algorithm”, Asian Journal of Research in Social Sciences and Humanities, Vol.6,Issue.6, pp.969-981, 2016.

[18] Prakash S, Vijayakumar M, “ Risk assessment in cancer treatment using association rule mining

techniques”, Asian Journal of Research in Social Sciences and Humanities,Vol.6,Issue.10, pp.1031-1037,

2016.

[19] Prabhakar E, “ Enhanced adaboost algorithm with modified weighting scheme for imbalanced problems,

The SIJ transaction on Computer science & its application,Vol.6,Issue.4, pp.22-26, 2018.

[20] Suresh kumar V S, Thiruvankatasamy S, Sudhakar R, “Optimized Multicloud Multitask Scheduler For

Cloud Storage And Service By Genetic Algorithm And Rank Selection Method”, Vol.3,Issue.2, pp.1-6,

2014.

[21] Prabhakar E, Santhosh M, Hari Krishnan A, Kumar T, Sudhakar R,” Sentiment Analysis of US Airline

Twitter Data using New Adaboost Approach”, International Journal of Engineering Research &

Technology (IJERT), Vol.7, Issue.1, pp.1-6, 2019.

[22] Dhivyaa C R, Vijayakumar M,” An effective detection mechanism for localizing macular region and

grading maculopathy”, Journal of medical systems, Vol.43, Issue.3, pp.53-, 2019.

[23] K Nithya, M Saranya, CR Dhivyaa, “Concept Based Labeling of Text Documents Using Support Vector

Machine”, International Journal on Recent and Innovation Trends in Computing and Communication, vol.

2, no. 3, pp. 541-544, (2014).

[24] Nandagopal S., Arunachalam V.P., Karthik S."A novel approach for inter-transaction association rule

mining, Journal of Applied Sciences Research VOL, 8, Issue 7, 2012.

[25] Kannan R., Selvambikai M., Jeena Rajathy I., Ananthi S. Rasayan, A study on structural analysis of

electroplated Nano crystalline nickel based thin films, Journal of Chemistry, Vol 10, issue 4, 2017.

[26] Arunvivek G.K., Maheswaran G., Senthil Kumar S., Senthilkumar M., Bragadeeswaran T. Experimental

study on influence of recycled fresh concrete waste coarse aggregate on properties of concrete. International

Journal of Applied Engineering Research, Vol 10, issue 11, 2015

[27] Krishna S.K., Sathya M. Usage of nanoparticle as adsorbent in adsorption process. A review International

Journal of Applied Chemistry, vol 11, Issue 2, 2015.

[28] Sudha S., Manimegalai B., Thirumoorthy P. A study on routing approach for in-network aggregation in

wireless sensor networks, International Conference on Computer Communication and Informatics:

Ushering in Technologies of Tomorrow, Today, ICCCI 2014.

[29] Satheesh A., Jeyageetha V. Improving power system stability with facts controller using certain intelligent

techniques, International Journal of Applied Engineering Research, Vol 9, no 23, 2014.

[30] Ashok V., Kumar N, Determination of blood glucose concentration by using wavelet transform and neural

networks, Iranian Journal of Medical Sciences, Vol 38, Issue 1, 2013.

[31] Somasundaram K., Saritha S., Ramesh K, Enhancement of network lifetime by improving the leach protocol

for large scale WSN, Indian Journal of Science and Technology, Vol 9, Issue 16, 2016.

[32] Jayavel S., Arumugam S., Singh B., Pandey P., Giri A., Sharma A. Use of Artificial Intelligence in

automation of sequential steps of software development / production, Journal of Theoretical and Applied

Information Technology, Vol 57, Issue 3, 2013.

[33] Ramesh Kumar K.A., Balamurugan K., Gnanaraj D., Ilangovan S, Investigations on the effect of flyash on

the SiC reinforced aluminium metal matrix composites, Advanced Composites Letters, Vol 23, Issue 3,

2014.

[34] Suresh V.M., Karthikeswaran D., Sudha V.M., Murali Chandraseker D, Web server load balancing using

SSL back-end forwarding method. IEEE-International Conference on Advances in Engineering, Science

and Management, ICAESM-2012, 2012.

[35] Karthikeswaran D., Sudha V.M., Suresh V.M., Javed Sultan A, A pattern based framework for privacy

preservation through association rule mining, IEEE-International Conference on Advances in Engineering,

Science and Management, ICAESM-2012, 2012.

[36] Senthil J., Arumugam S., Shah P, Real time automatic code generation using generative programming

paradigm, European Journal of Scientific Research, vol. 78, issue 4, 2012.

[37] Vijayakumar J., Arumugam S, Certain investigations on foot rot disease for betelvine plants using digital

imaging technique, Proceedings - 2013 International Conference on Emerging Trends in Communication,

Control, Signal Processing and Computing Applications, IEEE-C2SPCA", 2013.

[38] Vijayakumar J., Arumugam S. Odium piperis fungus identification for piper betel plants using digital image

processing, Journal of Theoretical and Applied Information Technology, vol 60, issue 2, 2014.

[39] Manchula A., Arumugam S, Face and fingerprint biometric fusion: Multimodal feature template matching

algorithm, International Journal of Applied Engineering Research, vol 9, issue 22, 2014.

[40] Ramesh Kumar K.A., Balamurugan K., Arungalai Vendan S., Bensam Raj J, Investigations on thermal

properties, stress and deformation of Al/SiC metal matrix composite based on finite element method.

Carbon - Science and Technology, Vol 6, Issue 3, 2014.

[41] Kanchana A., Arumugam S, Palm print texture recognition using connected-section morphological

segmentation, Asian Journal of Information Technology Vol 6, Issue 3, 2014.

[42] Padmapriya R., Thangavelu P, Characterization of nearly open sets using fuzzy sets, Global Journal of Pure

and Applied Mathematics, vol 11, issue 1, 2015.

[43] P.B. Narandiran, T. Bragadeeswaran, M. Kamalakannan, V. Aravind, Manufacture of Flyash Brick Using

Steel Slag and Tapioca Powder. Jour of Adv Research in Dynamical & Control Systems, Vol. 10, No. 12,

2018, 527-532

[44] R. Girimurugan*, N. Senniangiri, K. Adithya, B. Velliyangiri, Mechanical Behaviour of Coconut Shell

Powder Granule Reinforced Epoxy Resin Matrix Bio Composites, Jour of Adv Research in Dynamical &

Control Systems, Vol. 10, No. 12, 2018, 533-541

Downloads

Published

31.10.2019

How to Cite

Krishnakaarthik, T., Rajavenkatesswaran, K., Nandagopal, S., & Saveetha, P. (2019). Intrusion Detection and Vulnerability Analysis with Temporal Relationalship. International Journal of Psychosocial Rehabilitation, 23(4), 1205-1216. https://doi.org/10.61841/4n3fh985