Campus Hybrid Intrusion Detection System Using SNORT and C4.5 Algorithm

Slamet, Slamet, Mohamed, Izzeldin Ibrahim and Samsuri, Fahmi (2019) Campus Hybrid Intrusion Detection System Using SNORT and C4.5 Algorithm. In: InECCE2019 : Proceedings of the 5th International Conference on Electrical, Control & Computer Engineering. Lecture Notes in Electrical Engineering, 632 . Springer Singapore, Kuantan, Pahang, Malaysia, pp. 592-602. ISBN 978-981-15-2316-8

[img] Text
Abstrak.pdf

Download (984kB)
[img] Text
Turnitin - Hybrid Intrusion Detection.pdf

Download (2MB)

Search this title on : |

Abstract

The rapid development of the internet greatly helps human work. However, the number of information system security incidents has risen sharply, so that in fact the sides of human life are threatened. Detection techniques against attacks on computer networks must be continuously developed so that integrity, availability, and confidentiality on a computer network become more secure. In general, intrusion detection systems currently use two detection methods, namely anomaly detection, and misuse detection, which both have their own deficiencies. In this paper, the authors built a Hybrid Intrusion Detecting System combines anomaly detection system with the misuse detection system. Snort is used as the basis of misused detection module and Algorithm C4.5 detector is used to construct an anomaly detection module. This system works by creating alerts built from an engine that reads the parameters in the attacker’s IP address. Webmin is used to simplify rule management. Whereas for analyzing logs (attack history), an ACID (Analysis Console for Intrusion Databases) is used. Attack and detection testing are carried out in the campus network of Institut Bisnis dan Informatika Stikom Surabaya. The system implementation uses a PC Router with the Ubuntu 18.04 Linux as the operating system. As a result of implementing this system: the signature of attacks as misuses detection module uses to detection the known attacks; unknown attacks can be detected by the anomaly detection module; signature of attacks that are detected by Anomaly Detection System module extracted by signature generation module, and maps the signatures into snort rules.


Export Record


Item Type: Book Section
Dewey Decimal Classification: 000 – Computer science, information & general works > 000 Computer science, knowledge & systems > 000 Computer science, information & general works
Divisions: Perpustakaan > Journals
Depositing User: Agung P. W.
Date Deposited: 25 Sep 2023 11:16
Last Modified: 25 Sep 2023 11:16
URI: http://repository.dinamika.ac.id/id/eprint/7207

Download Statistics

Downloads over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Actions (login required)

View Item   View Item