Skip to main content
Book cover

InECCE2019 pp 591–603Cite as

Campus Hybrid Intrusion Detection System Using SNORT and C4.5 Algorithm

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 632))

Abstract

The rapid development of the internet greatly helps human work. However, the number of information system security incidents has risen sharply, so that in fact the sides of human life are threatened. Detection techniques against attacks on computer networks must be continuously developed so that integrity, availability, and confidentiality on a computer network become more secure. In general, intrusion detection systems currently use two detection methods, namely anomaly detection, and misuse detection, which both have their own deficiencies. In this paper, the authors built a Hybrid Intrusion Detecting System combines anomaly detection system with the misuse detection system. Snort is used as the basis of misused detection module and Algorithm C4.5 detector is used to construct an anomaly detection module. This system works by creating alerts built from an engine that reads the parameters in the attacker’s IP address. Webmin is used to simplify rule management. Whereas for analyzing logs (attack history), an ACID (Analysis Console for Intrusion Databases) is used. Attack and detection testing are carried out in the campus network of Institut Bisnis dan Informatika Stikom Surabaya. The system implementation uses a PC Router with the Ubuntu 18.04 Linux as the operating system. As a result of implementing this system: the signature of attacks as misuses detection module uses to detection the known attacks; unknown attacks can be detected by the anomaly detection module; signature of attacks that are detected by Anomaly Detection System module extracted by signature generation module, and maps the signatures into snort rules.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Öğütçü G, Testik ÖM, Chouseinoglou O (2016) Analysis of personal information security behavior and awareness. Comput Secur 56:83–93

    Article  Google Scholar 

  2. Huang L, Wang X (2016) On the construction of university campus culture under the network environment. In: 3rd international conference on education, management and computing technology (ICEMCT 2016)

    Google Scholar 

  3. Chun G, Ping Y, Liu N, Luo S-S (2016) A two-level hybrid approach for intrusion detection. Neuro Comput 214:391–400

    Google Scholar 

  4. Gisung K, Seungmin L, Sehun K (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4 Part 2):1690–1700

    Google Scholar 

  5. Peng J et al (2006) A hybrid intrusion detection and visualization system. In: Proceedings of the 13th annual IEEE international symposium and workshop on engineering of computer based systems, p 2

    Google Scholar 

  6. Peddabachigari S et al (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30(1):114–132

    Article  Google Scholar 

  7. Wang X, Kordas A, Hu L, Gaedke M, Smith D (2013) Administrative evaluation of intrusion detection system. In: Proceedings of the 2nd annual conference on research in information technology, RIIT’13. ACM, NY, USA, pp 47–52

    Google Scholar 

  8. Bulajoul W, James A, Pannu M (2013) Network intrusion detection systems in high-speed traffic in computer networks. In: 2013 IEEE 10th international conference on e-Business engineering (ICEBE), pp 168–175

    Google Scholar 

  9. Trabelsi Z, Zeidan S (2014) IDS performance enhancement technique based on dynamic traffic awareness histograms. In: IEEE international conference on communications (ICC), pp 975–980

    Google Scholar 

  10. Vishnu Balan E, Priyan MK, Gokulnath C, Usha Devi G (2015) Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In: International conference on communications and signal processing (ICCSP)

    Google Scholar 

  11. Snapp SR, Brentano J, Dias G, Goan TL, Heberlein LT (2017) DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype. dl.lib.mrt.ac.lk

    Google Scholar 

  12. Tuyikeze T, Pottas D (2010) An information security policy development life cycle. In: Proceedings of the South African information security multi-conference (SAISMC)

    Google Scholar 

  13. Kosamkar V, Chaudhari SS (2014) Improved intrusion detection system using C4.5 decision tree and support vector machine. Int J Comput Sci Info Technol 5(2):1463–1467

    Google Scholar 

  14. SnortTM Users Manual (2019) http://www.snort.org/. The Snort Project

  15. Snort FAQ (2019) http://www.snort.org/. The Snort Project

  16. http://kdd.ics.uci.edu/databases/kddcup99 (2019)

  17. Wu S-Y, Yen E (2009) Data mining-based intrusion detectors. Expert Syst Appl 36(3):5605–5612

    Article  Google Scholar 

  18. Caulkins BD, Lee J, Wang M (2005) A dynamic data mining technique for intrusion detection systems. In: Proceedings of the 43rd annual southeast regional conference, vol 2, ACM, pp 148–153

    Google Scholar 

Download references

Acknowledgements

The research is funded by University Malaysia Pahang, UMP Lab2Market Research Fund (UIC170901). This acknowledgment also goes to the Faculty of Electrical and Electronic Engineering for providing us with facilities to conduct this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Slamet .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Slamet, Mohamed, I.I., Samsuri, F. (2020). Campus Hybrid Intrusion Detection System Using SNORT and C4.5 Algorithm. In: Kasruddin Nasir, A.N., et al. InECCE2019. Lecture Notes in Electrical Engineering, vol 632. Springer, Singapore. https://doi.org/10.1007/978-981-15-2317-5_50

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2317-5_50

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2316-8

  • Online ISBN: 978-981-15-2317-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics