Counteraction Against Digital Data Leak: Open Source Software for Intrusion Detection and Prevention

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2021 by IJETT Journal
Volume-69 Issue-3
Year of Publication : 2021
Authors : Nguyen Huy Binh, Le Trung Kien
DOI :  10.14445/22315381/IJETT-V69I3P204

Citation 

MLA Style: Nguyen Huy Binh, Le Trung Kien  "Counteraction Against Digital Data Leak: Open Source Software for Intrusion Detection and Prevention" International Journal of Engineering Trends and Technology 69.3(2021):17-22. 

APA Style:Nguyen Huy Binh, Le Trung Kien. Counteraction Against Digital Data Leak: Open Source Software for Intrusion Detection and Prevention  International Journal of Engineering Trends and Technology, 69(3),17-22.

Abstract
This work performs a generalized analysis of intrusion detection systems (IDS) software in terms of a certain basic set of criteria. The IDS are studied, their essence is specified and disclosed comprehensively. Publications devoted to the analysis of software for detection and prevention of cyber threats and intrusions are reviewed. On the basis of the experimental results, six modern IDS are analyzed in terms of nine basic criteria: Class of cyberattacks, Adaptivity, Methods of detection, System control, Scalability, Surveillance level, Response to cyber attack, Security, and OS support. It has been concluded that the analysis of software for intrusion detection by basic criteria allows developers and users to select open-source software for information systems protection.

Reference
[1] W. Zhao, and G. White, A collaborative information sharing framework for community cybersecurity, in IEEE Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, (2012) 457-462. https://doi.org/10.1109/THS.2012.6459892.
[2] I. E. Lyubushkina, E. M. Zverev, and A. V. Sharamok, Implementation of information security devices in equilibrium codes, Journal of Theoretical and Applied Information Technology, 98(23)(2020) 3909-3920.
[3] A. Bondarenko, and K. Zaytsev, Studying systems of open source messaging, Journal of Theoretical and Applied Information Technology, 97(19)(2019) 5115-5125.
[4] A. Kolychev, and K. Zaytsev, Studying open banking platforms with open source code, Journal of Theoretical and Applied Information Technology, 97(11)(2019) 3038-3052.
[5] M. S. Hoque, A. Mukit, and A. N. Bikas, An implementation of an intrusion detection system using genetic algorithm, International Journal of Network Security & Its Applications, 4(2)(2012) 109-120.
[6] H. J. Liao, C. H. R. Lin, Y. C. Lin, and K. Y. Tung, Intrusion detection system: A comprehensive review, Journal of Network and Computer Applications, 36(1)(2013) 16-24.
[7] A. P. Singh, and M. D. Singh, Analysis of the host-based and network-based intrusion detection system, International Journal of Computer Network and Information Security, 6(8)(2014) 41-47.
[8] W. Park, and S. Ahn, Performance comparison and detection analysis in snort and suricata environment, Wireless Personal Communications, 94(2)(2017) 241–252.
[9] Y. Lin, Y. Zhang, Y. – J. Ou, The Design, and Implementation of Host-Based Intrusion Detection System, in 2020 Third International Symposium on Intelligent Information Technology and Security Informatics, Jian, China, (2010) 595-598. https://doi.org/10.1109/IITSI.2010.127
[10] N. M. Jacob, and M. Y. Wanjala, A Review of Intrusion Detection Systems, Global Journal of Computer Science and Information Technology Research, 5(4)(2017) 1-5.
[11] H. Jin, G. Xiang, D. Zou, F. Zhao, M. Li, and C. Yu, A guest-transparent file integrity monitoring method in a virtualization environment, Computers & Mathematics with Applications, 60(2)(2010) 256–266.
[12] C. A. Catania, and C. G. Garino, Automatic network intrusion detection: Current techniques and open issues, Computers & Electrical Engineering, 38(5)(2012) 1062-1072.
[13] G. Jakobson, Mission-centricity in cybersecurity: architecting cyber-attack resilient missions, in 2013 5th International Conference on Cyber Conflict (CYCON), Tallinn, Estonia, (2013) 1-18.
[14] N. Ben-Asher, and C. Gonzalez, Effects of cybersecurity knowledge on attack detection, Computers in Human Behavior, 48(2015) 51–61.
[15] R. Patel, A. Thakkar, and A. Ganatra, A Survey and Comparative Analysis of Data Mining Techniques for Network Intrusion Detection Systems, International Journal of Soft Computing and Engineering, 2(1)(2012) 265-260.
[16] O. Lawal, Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware, African Journal of Computing & ICT, 6(2)(2013) 169-184.
[17] R. Mitchell, and R. Chen, A survey of intrusion detection in wireless network applications, Computer Communications, 42(2014) 1-23.
[18] E. H. Spafford, and D. Zamboni, Intrusion detection using autonomous agents, Computer Networks, 34(4)(2000) 547–570.
[19] J. Sen, An Agent-Based Intrusion Detection System for Local Area Networks, International Journal of Communication Networks and Information Security, 2(2)(2010) 128-140.
[20] G. Vigna, and R. A. Kemmerer, NetSTAT: A Network-based Intrusion Detection Approach, in Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), Phoenix, AZ, USA, (1998) 25-34. https://doi.org/10.1109/CSAC.1998.738566.
[21] C. Wang, Y. Cai, Q. Zhou, and H. Wang, ASAX: Automatic security assertion extraction for detecting Hardware Trojans, in 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), Jeju, (2018), 84-89. https://doi.org/10.1109/ASPDAC.2018.8297287
[22] A. Hay, D. Cid, and R. Bray, OSSEC Host-Based Intrusion Detection Guide. Elsevier Inc., 2008, 307 p. Available: http://index-of.co.uk/Hacking-Coleccion/OSSEC%20Host-Based%20Intrusion%20Detection%20Guide.pdf.
[23] R. K. Jain, and P. Trivedi, OSSEC Based Authentication Process with Minimum Encryption and Decryption Time for Virtual Private Network, in 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN), Tehri, (2016) 442-445. https://doi.org/10.1109/CICN.2016.92.
[24] K. Nam, and K. Kim, A Study on SDN security enhancement using open source IDS/IPS Suricata, in 2018 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, (2018) 1124-1126. https://doi.org/10.1109/ICTC.2018.8539455
[25] M. Nel, SAMHAIN: Host Based Intrusion Detection via File Integrity Monitoring. SANS Institute, (2014) 27 Available: https://www.sans.org/reading-room/whitepapers/detection/samhain-host-based-intrusion-detection-file-integrity-monitoring-34567
[26] Mohammad Dawood Momand, Dr Vikas Thada, Mr. Utpal Shrivastava, Intrusion Detection System in IoT Network, IJETT International Journal of Computer Science and Engineering 7(4) (2020) 11-15.

Keywords
administering, software, cyber attack.