LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Salih, A; Ma, X; Peytchev, E (2017)
Publisher: Springer
Languages: English
Types: Part of book or chapter of book
Subjects:
Intrusion detection systems offer monolithic way to detect attacks through monitoring, searching for abnormal characteristics and malicious behavior in network communications. Cyber-attack is performed through using covert channel which currently, is one of the most sophisticated challenges facing network security systems. \ud Covert channel is used to ex/infiltrate classified information from legitimate targets, consequently, this \ud manipulation violates network security policy and privacy. The New Generation Internet Protocol version 6 (IPv6) has certain security vulnerabilities and need to be addressed using further advanced techniques. Fuzzy rule is implemented to classify different network attacks as an advanced machine learning technique, meanwhile, \ud Genetic algorithm is considered as an optimization technique to obtain the ideal fuzzy rule. This paper suggests a novel hybrid covert channel detection system implementing two Artificial Intelligence (AI) techniques; Fuzzy Logic and Genetic Algorithm (FLGA) to gain sufficient and optimal detection rule against covert channel. Our \ud approach counters sophisticated network unknown attacks through an advanced analysis of deep packet inspection. Results of our suggested system offer high detection rate of 97.7% and a better performance in comparison to previous tested techniques.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Bahaman, N., Anton Satria, P., & Mas' ud, Z. (2011). Implementation of IPv6 network testbed: Intrusion detection system on transition mechanism. Journal of Applied Sciences, 11(1), 118-124.
    • Chen, S. H., Jakeman, A. J., & Norton, J. P. (2008). Artificial intelligence techniques: an introduction to their use for modelling environmental systems. Mathematics and Computers in Simulation, 78(2), 379-400.
    • Choudhary, A. R. (2009, November). In-depth analysis of IPv6 security posture. In 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.
    • Fries, T. P. (2008, July). A fuzzy-genetic approach to network intrusion detection. In Proceedings of the 10th annual conference companion on Genetic and evolutionary computation (pp. 2141-2146). ACM.
    • Gomez, J., & Dasgupta, D. (2002, June). Evolving fuzzy classifiers for intrusion detection. In Proceedings of the 2002 IEEE Workshop on Information Assurance (Vol. 6, No. 3, pp. 321-323). New York: IEEE Computer Press.
    • Hoque, M. S., Mukit, M., Bikas, M., & Naser, A. (2012). An implementation of intrusion detection system using genetic algorithm. ArXiv preprint arXiv: 1204.1336.
    • Jongsuebsuk, P., Wattanapongsakorn, N., & Charnsripinyo, C. (2013, January). Network intrusion detection with Fuzzy Genetic Algorithm for unknown attacks. In Information Networking (ICOIN), 2013 International Conference on (pp. 1-5). IEEE.
    • Liu, Z., & Lai, Y. (2009). A data mining framework for building intrusion detection models based on IPv6. In Advances in Information Security and Assurance (pp. 608-618). Springer Berlin Heidelberg.
    • Mahoney, M. V., & Chan, P. K. (2003, September). An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. InRecent Advances in Intrusion Detection (pp. 220-237). Springer Berlin Heidelberg.
    • Marc, Hauser. (2013).”IPv6 Security Vulnerabilities” Available https://www.thc.org/thc-ipv6 . Accessed 10 Feb 2016.
    • Martin, C. E., & Dunn, J. H. (2007, October). Internet Protocol version 6 (IPv6) protocol security assessment. In Military Communications Conference, 2007. MILCOM 2007. IEEE (pp. 1-7). IEEE.
    • Redhwan. M. A. Saad, Slevakumar Manickam, Ramadass, S. (2013) Intrusion Detection System in IPv6 Network Based on Data Mining Techniques-Survey. Proc. of 2nd International Conference on Advances in Computer and Information Technology ACIT 2013.Malaysia.
    • Salih, A., Ma, X., & Peytchev, E. (2015). Detection and Classification of Covert Channels in IPv6 Using Enhanced Machine Learning. Proc of the International Conference on Computer Technology and Information Systems. (ICCTIS) N & N Global Technology DUBAI, UAE, 2015.
    • Salih, A., Xiaoqi Ma, and Evtim Peytchev. (2015) “New Intelligent Heuristic Algorithm to Mitigate Security Vulnerabilities in IPv6”, International Journal for Information Security (IJIS), Volume 4, DOI: 04.IJIS.2015.
    • Sohn, T., Seo, J., & Moon, J. (2003, October). A study on the covert channel detection of TCP/IP header using support vector machine. In ICICS (pp. 313-324).
    • Supriyanto, Hasbullah, I. H., Murugesan, R. K., & Ramadass, S. (2013). Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods. IETE Technical Review, 30(1), 64- 71.
    • Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD CUP 99 data set. In Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defense Applications 2009.
    • Vivek, T. K., & Kalimuthu, M. Improving Intrusion Detection Method for Covert Channel in TCP/IP Network. International Journal of Computer Science Trends and Technology (IJCST), vol.2, no. 2, March. 2014.
    • Wendzel, S., Zander, S., Fechner, B., & Herdin, C. (2015). Pattern-based survey and categorization of network covert channel techniques. ACM Computing Surveys (CSUR), 47(3), 50.
    • Zander, S., Armitage, G., & Branch, P. (2006, December). Covert channels in the IP time to live field. In Proceedings of Australian Telecommunication Networks and Applications Conference (ATNAC).
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article