Abstract
Recently, network technology had brought a variety of attacks on the Internet, unfortunately, no one is safe in this trend. Network managers try to find the attackers and search for the suspicious behaviors in the network connections to defend their services. Intrusion Detection System (IDS) can help network managers to find out the network attacks, but for some special cases, IDS has its limitation. Proposed system integrated network-based IDS (NIDS) and host-based IDS (HIDS) to detect the suspicious behavior and assess the risk value of each IP. This research is dedicated to separating attacks and suspicious behaviors analysis by network-based IDS and host-based IDS. Furthermore, the proposed system will also find the relations among suspicious IP by using the modified PageRank algorithm and correlate the events to estimate the risk for each IP. The ranking of each IP represent the risk level and network managers can protect the hosts by the ranking. The experiment results show that the proposed system can achieve the goal of managing attack and tracking the suspicious ones. It can help users to take appropriate action in time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ehrenfeld, J.M.: Wannacry, cybersecurity and health information technology: a time to act. J. Med. Syst. 41(7), 104 (2017)
Narayanaswamy, K., Burns, B., Manthena, V.R.R.: Protecting against distributed network flood attacks. U.S. Patent No. 8,789,173, 22 July 2014
Sabahi, F., Movaghar, A.: Intrusion detection: a survey. In: 2008 Third International Conference on Systems and Networks Communications (2008)
Lazarevic, A., Kumar, V., Srivastava, J.: Intrusion detection: a survey. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats, pp. 19–78. Springer, Boston (2005)
Liao, H., Lin, C.R., Lin, Y., Tung, K.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)
Vokorokos, L., Balaz, A.: Host-based intrusion detection system. In: 2010 IEEE 14th International Conference on Intelligent Engineering Systems (2010)
Vigna, G., Kemmerer, R.: NetSTAT: a network-based intrusion detection system. J. Comput. Secur. 7(1), 37–71 (1999)
Data Mining: Concepts and Techniques. Liacs.leidenuniv.nl (2018). http://liacs.leidenuniv.nl/~bakkerem2/dbdm2007/05_dbdm2007_Data%20Mining.pdf. Accessed 10 Oct 2018
Page, L., et al.: The PageRank citation ranking: bringing order to the web. Stanford InfoLab (1999)
ISO 31000:2018. Iso.org (2018). https://www.iso.org/obp/ui/#iso:std:iso:31000:ed-2:v1:en. Accessed 3 Oct 2018
Li, S., et al.: An improved information security risk assessments method for cyber-physical-social computing and networking. IEEE Access 6, 10311–10319 (2018)
Codetta-Raiteri, D., Portinale, L.: Decision networks for security risk assessment of critical infrastructures. ACM Trans. Internet Technol. (TOIT) 18(3), 29 (2018)
Tseng, D., Yang, C.: A NetFlow based malicious traffic detection research using XGBoost. Cheng Kung University, Institute of Computer and Communication Engineering (2018)
Kuo, C., Yang, C.: Design and implementation of a network intrusion detection system based on NetFlow. Cheng Kung University, Institute of Computer and Communication Engineering (2015)
Yao, S., Yang, C.: Design and implementation of a host-based intrusion detection system for Linux-based web server on signature-based approach. Cheng Kung University, Institute of Computer and Communication Engineering (2018)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Hou, CL., Kuo, CC., Liu, IH., Yang, CS. (2020). Implementation of an IP Management and Risk Assessment System Based on PageRank. In: Yang, CN., Peng, SL., Jain, L. (eds) Security with Intelligent Computing and Big-data Services. SICBS 2018. Advances in Intelligent Systems and Computing, vol 895. Springer, Cham. https://doi.org/10.1007/978-3-030-16946-6_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-16946-6_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16945-9
Online ISBN: 978-3-030-16946-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)