Enhancing Intrusion Detection via a Active Target Host

Abimbola, A., Munoz, J., Buchanan, W. (2006). Enhancing Intrusion Detection via a Active Target Host. In: (Ed.) IEEE ICTe Africa 2006, , () ( ed.). (pp. ). Kenya: . IEEE Computer Society Press.


ISBN:
ISSN:

Abstract

Over the past decade, there have been increases in network attacks. These attacks are typically at-tempts to compromise the integrity, confidentiality or availability of networked resources. In other to reduce these attacks, Intrusion Detection Systems (IDS) were introduced. These systems monitor and analyse network traffic, and try to detect network attacks, and, in response, execute counter-measures, which overcome current security weaknesses. In this paper we present a quick review of IDS and their vulnerabilities, discuss, in detail, the performance unreliability of IDS’s against end-to-end encrypted attacks, network fragmented attacks and denial of service exploitation of pro-gramming flaws. These vulnerabilies are illustrated in order to verify and validate the discussion. The experiments measure the performance of Snort, which is a network IDS which detecting the stated network attacks. Our experimental findings show that Snort could only detect 50% denial of service exploitation of programming flaws and 0% end-to-end encrypted attacks.
[Read More]

Authors

William Buchanan
Director of CDCS
w.buchanan@napier.ac.uk
+44 131 455 2759

Areas of Expertise

Cyber-Security
Electronic information now plays a vital role in almost every aspect of our daily lives. So the need for a secure and trustworthy online infrastructure is more important than ever. without it, not only the growth of the internet but our personal interactions and the economy itself could be at risk.

Associated Projects