Strategic Sensor Placement for Intrusion Detection in Network-Based IDS

Full Text (PDF, 410KB), PP.61-68

Views: 0 Downloads: 0

Author(s)

Longe Olumide Babatope 1,* Lawal Babatunde 2 Ibitola Ayobami 3

1. Department of Computer & Information Systems, Adeleke University, Ede, State of Osun, Nigeria

2. Computer Science Department, Olabisi Onabanjo University Consult Ibadan Centre, Ibadan, Nigeria

3. Department of Computer Systems, Lead City University, Ibadan, Oyo State, Nigeria

* Corresponding author.

DOI: https://doi.org/10.5815/ijisa.2014.02.08

Received: 22 Jun. 2013 / Revised: 5 Sep. 2013 / Accepted: 15 Oct. 2013 / Published: 8 Jan. 2014

Index Terms

Sensors, Placement, Intrusion Detection System, Network-Based IDPS

Abstract

Network Intrusion Detection Systems (NIDSs) can be composed of a potentially large number of sensors, which monitor the traffic flowing in the network. Deciding where sensors should be placed and what information they need in order to detect the desired attacks can be a demanding task for network administrators, one that should be made as automatic as possible. Some few works have been done on positioning sensors using attack graph analysis, formal logic-based approach and Network Simulator NS2 which were studied to determine a strategy for sensors placement on the network. This paper analysed the major considerations for sensors placements, typical sensors deployments in NIDS, and established an extended model for sensors deployment to further strengthen the network for intrusion detection which was based on the escape of some malicious activities through the firewall.

Cite This Paper

Longe Olumide Babatope, Lawal, Babatunde, Ibitola Ayobami, "Strategic Sensor Placement for Intrusion Detection in Network-Based IDS", International Journal of Intelligent Systems and Applications(IJISA), vol.6, no.2, pp.61-68, 2014. DOI:10.5815/ijisa.2014.02.08

Reference

[1]NIST SP 800-92, Guide to Computer Security Log Management, available at http://csrc.nist.gov/publications/nistpubs/ 

[2]Rolando, M., Rossi, M., Sanarico, N., Mandrioli, D.: A formal approach to sensor placement and configuration in a network intrusion detection system. In: SESS 2006: Proceedings of the 2006 international workshop on Software engineering for secure systems, pp. 65–71. ACM, New York (2006).

[3]The BSD Syslog Protocol, http://www.ietf.org/rfc/rfc3164.txt. 

[4]NIST SP 800-86, Guide to Integrating Forensic Techniques into Incident Response, http://csrc.nist.gov/publications/nistpubs/ 

[5]Alan Mainwaring et al, Wireless Sensor Networks for Habitat Monitoring

[6]Noel, S., Jajodia, S.: Attack graphs for sensor placement, alert prioritization, and attack response. In: Cyberspace Research Workshop. (2007)

[7]H. Chen et al, 2009. A Multi-objective Optimisation Approach to IDS Placement. Springer Berlin Heidelberg. http://link.springer.com/chapter/10.1007%2F978-3-642-04091-7_13#page-1

[8]The Placement of IDS Sensors. Briefing Paper by Kevin Graham. http://www.idsec.co.uk/about/briefings/ids-sensor-placement.html

[9]http://www.ciscopress.com/articles/article.asp?p=25327 &seqNum=4

[10]Yi Zou and Krishnendu Chakrabarty (2003). Sensor Deployment and Target Localization Based on Virtual Forces. IEEE INFOCOM 2003

[11]William Stallings & Lawrie Brown. Computer Security: Principles and Practice. Published Aug 2, 2007 by Prentice Hall. ISBN-13: 978-0-13-600424-0. 1st Edition.

[12]http://82.157.70.109/mirrorbooks/snortids/0596006616/snortids-CHP-5-SECT-5.html

[13]Jan Beutel et al. Deployment Techniques for Sensor Networks. citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.3388‎.