Reliability Theory Application of Bipolar Network in Monitoring and Detecting Network Intrusion

Doan Thanh Binh1, , Nguyen Trung Hien2, Do Manh Ha3, Dinh Thi Nhung4
1 Electric Power University, No.235 Hoang Quoc Viet, Bac Tu Liem, Hanoi, Viet Nam
2 BacNinh Telecommunications, No. 33, Ly Thai To, Suoi Hoa, Bacninh, Viet Nam
3 ThuongMai University, No. 79, Ho Tung Mau, Cau Giay, Hanoi, Viet Nam
4 Hanoi University of Science and Technology, No. 1, Dai Co Viet, Hai Ba Trung, Hanoi, Viet Nam

Main Article Content

Abstract

Today the rapid and widespread development of computer networks and computer network environments brings many risks and threats to network security that cause loss or change data of information systems. Security attacks that change the state and components of the system will leave traces, so tracking for network security attacks is of interest. Depending on the monitoring environment and the protocols used to transmit information between network nodes, tracking of network security attacks is done in different ways. Network security attacks affect the communication of information between network nodes, changing the dynamic relationship between network nodes and their reliability. The problem of evaluating internal network reliability to trace network intrusion detection is given and resolved in this article.

Article Details

References

[1] Sundararaman Jeyaraman and Mikhail J.Atallah, An empirical study of automated event reconstruction systems, Digital Investigation, 3 (Supplement - 1):108-115, 2006.
[2] P.Garcia-Teodoro, J.Diaz-Verdejo, G.Macia-Fernandez, and E.Vazquez, Anomaly-based network intrusion detection: Techniques, systems and challenges, Computers & Security, Vol.28, pp. 18-28, 2009.
[3] A.G.Pennington, J.D.Stunk, J.L.Griffin, C.A.Soules, G.R.Goodson, and G.R.Ganger, Storage-based instruction detection: Watching storage activity for suspicious behavior, Proceedings of the 12th USENIX Security Symposium, 2003.
[4] V.Stavridou, B.Duttertre, R.A.Riemenschneider, and H Saidi Intrusion tolerant software architectures, DARPA Information Survivability Conference & Exposition II, DISCEX ’01., volume 2, pages 230-241, Anaheim, CA, USA, 2001.
[5] B. Mukherjee, L. T. Heberlein, and K. N. Levitt, Network intrusion detection, Network, IEEE, vol. 8, no. 3, pp. 26-41,1994.
[6] J. Z. Lei and Ali Ghorbani, Network intrusion detection using an improved competitive learning neuralnetwork, in Proceedings of the Second Annual Conference on Communication Networks and Services Research (CNSR’04), pp. 190–197.IEEE-Computer Society, IEEE, May 2004.
[7] Deepika P Vinchurkar and Alpa Reshamwala,A Review of Intrusion Detection System Using Neural Network and Machine Learning Technique, International Journal of Engineering Science and Innovative Technology (IJESIT), Volume 1, Issue 2, November 2012.
[8] P.G. Watkins and F.H. Knight, Risk Uncertainty and Profit Knight, Q. J. Econ., vol. 36, no. 4, p. 682, 1922.