Open Access Open Access  Restricted Access Subscription or Fee Access

Combination of Misuse and Anomaly Intrusion Detection Systems

B. Saravanakumaran


This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS) to provide the cyber security. This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By mining anomalous traffic episodes from Internet connections, build an ADS that detects ano-malies beyond the capabilities of signature-based SNORT or Bro systems. A weighted signature generation scheme is developed to integrate ADS with SNORT by extracting signatures from anomalies detected. HIDS extracts signatures from the output of ADS and adds them into the SNORT signature database for fast and accurate intru-sion detection. By testing this HIDS scheme over real-life Internet trace data mixed with 10 days of Massachusetts Institute of Technol-ogy/ Lincoln Laboratory (MIT/LL) attack data set, our experimental results show a 60 percent detection rate of the HIDS, compared with 30 percent and 22 percent in using the SNORT and Bro systems, respectively. This sharp increase in detection rate is obtained with less than 3 percent false alarms. The signatures generated by ADS upgrade the SNORT perfor-mance by 33 percent. The HIDS approach proves the vitality of de-tecting intrusions and anomalies, simultaneously, by automated data mining and signature generation over Internet connection episodes.


Network Security, Anomaly Detection, Signature Generation, SNORT and BRO Systems, False Alarms, Internet Epi-sodes and Traffic Data Mining.

Full Text:



D. Barbara, J. Couto, S. Jajodia, L. Popyack, and N. Wu, “ADAM:Detecting Intrusions by Data Mining,” Proc. IEEE Workshop Information Assurance and Security, 2001.

D.J. Burroughs, L.F. Wilson, and G.V. Cybenko, “Analysis of Distri-buted Intrusion Detection Systems Using Bayesian Methods Perfor-mance,” Proc. IEEE Int’l Computing and Comm. Conf.,pp. 329-334, 2002.

M. Cai, K. Hwang, J. Pan, and C. Papadupolous, “WormShield:Fast Worm Signature Generation Using Distributed Fingerprint Aggrega-tion,” to be published in IEEE Trans. Dependable and Secure Compu-ting, 2007.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.