TYPE 2 HEURISTICS (T2H) IN INTRUSION DETECTION SYSTEM (IDS): A SURVEY

[ 31 Mar 2021 | vol. 15 | no. 1 | pp. 23-34 ]

About Authors:

Saira Beg, Ali Zahir, Azam Khan and Sajjad Mohsin
-Department of Computer Science, COMSATS Institute of Information Technology, Islamabad, Pakistan

Abstract:

In the last few decades networking and computer system fields have grown rapidly; a lot of organizations and countries have spent a lot of money on these areas. Most of the applications and businesses are moving towards e-accessibility, for which they require high security but unfortunately most of the systems are not sufficiently secure. Computer networks can be attacked by intruders (internal and external). With the increased use of computers and easy access to internet, the number and variety of attacks and vulnerabilities are on rise emphasizing the need to adopt some security measurements for the sake of privacy and reliability. Different security tools are presents such as authentication sequence, antivirus software, cryptography, firewall, Intrusion Detection System (IDS), and Intrusion Prevention System (IPS) etc. The relationship between access control level and user efficiency are inversely proportional, i.e. stricter the defense, lower the efficiency. Still they cannot provide 100% security to the systems individually, due to certain design or implementation restrictions. Cryptographic algorithms have their own limitation, as passwords can be cracked or lost. Firewalls make the network secured from the outsiders; even highly secured systems can be misused by internal intruders who violate their privileges. IDS on the other hand, identifies attacks of the computer networks and takes corrective measures (generate alarms) in order to prevent systems. In this paper our major aim is to discuss the utilization of Type 2 Heuristics (T2H) algorithms in Intrusion Detection Systems. T2H are generally known as meta-heuristics; which majorly focus on heuristics guidance. Major algorithms related to T2H are; Genetic Algorithm (GA), Simulated Annealing (SA), Tabu Search (TS) and Ant Colony Optimization (ACO) etc. the results shows that ACO performs well as secondary function with Fuzzy logic. Another pleasant fact is revealed that data reduction algorithm with T2H produces high detection rates.

Keywords:

IDS, Type 2 heuristics (T2H) techniques, CERT

 

About this Article: