PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks

11/22/2021
by   Yahya Javed, et al.
0

The increase in scale of cyber networks and the rise in sophistication of cyber-attacks have introduced several challenges in intrusion detection. The primary challenge is the requirement to detect complex multi-stage attacks in realtime by processing the immense amount of traffic produced by present-day networks. In this paper we present PRISM, a hierarchical intrusion detection architecture that uses a novel attacker behavior model-based sampling technique to minimize the realtime traffic processing overhead. PRISM has a unique multi-layered architecture that monitors network traffic distributedly to provide efficiency in processing and modularity in design. PRISM employs a Hidden Markov Model-based prediction mechanism to identify multi-stage attacks and ascertain the attack progression for a proactive response. Furthermore, PRISM introduces a stream management procedure that rectifies the issue of alert reordering when collected from distributed alert reporting systems. To evaluate the performance of PRISM, multiple metrics has been proposed, and various experiments have been conducted on a multi-stage attack dataset. The results exhibit up to 7.5x improvement in processing overhead as compared to a standard centralized IDS without the loss of prediction accuracy while demonstrating the ability to predict different attack stages promptly.

READ FULL TEXT

page 12

page 14

research
03/17/2021

Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss

Cyber attacks pose crucial threats to computer system security, and put ...
research
07/25/2018

Architectures for Detecting Real-time Multiple Multi-stage Network Attacks Using Hidden Markov Model

With the growing Cyber threats, the need to develop high assurance Cyber...
research
12/17/2020

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

In this paper, we present a study that proposes a three-stage classifier...
research
10/04/2018

Design and Evaluation of A Data Partitioning-Based Intrusion Management Architecture for Database Systems

Data-intensive applications exhibit increasing reliance on Database Mana...
research
10/04/2018

PIMS: A Partitioning-Based Intrusion Management System for Relational Databases

Data-intensive applications exhibit increasing reliance on Database Mana...
research
07/05/2022

An Intrusion Detection System based on Deep Belief Networks

The rapid growth of connected devices has led to the proliferation of no...
research
03/07/2018

Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs

The Man-in-the-Middle (MitM) attack is a cyber-attack in which an attack...

Please sign up or login with your details

Forgot password? Click here to reset