1. INTRODUCTION
In recent years, we have witnessed numerous reports of data breaches that have affected thousands of businesses globally. These incidents have had far-reaching implications, impacting customers, business owners, investors, and various other stakeholders. In response to these challenges, security professionals have sought to deploy solutions such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Intrusion Detection and Prevention Systems (IDPS) to address this issue. This paper aims to provide a comprehensive explanation of the issue at hand. Notably, zero-day attacks have made a significant impact in the United States. In 2016, the frequency and intensity of zero-day attacks surged, with over three billion such incidents recorded, as reported in the 2017 Symantec Internet Security Threat Report (Khraisat et al., 2019; Annadurai et al., 2022, Kaur et al., 2022)
As a vital component of network security, Intrusion Detection Systems (IDS) play the crucial role of detecting and responding to potentially hostile activities and policy violations on networks and systems. IDS solutions come in different forms, including Signature-based and Anomaly-based IDS, each tailored to specific application scenarios. Their respective advantages and disadvantages are summarized in the table below. In the present day, IDS systems and hybrid approaches, which integrate multiple IDS methods, are gaining increasing popularity and respect within the security community, especially in the context of safeguarding embedded systems (Shurman et al., 2019; Ponnusamy et al., 2022, Sharma, U, et al., 2022, Shafiq, D. A. et al., 2021). The primary objective of an IDS is to swiftly identify various types of malware, a task that a standard firewall may not accomplish. While the IDS may not directly halt an attack, it certainly serves as an early warning system for administrators, enabling them to take other measures to mitigate potential damage (Khraisat et al., 2019. Kumar et al., 2020).
An Intrusion Prevention System (IPS) is defined as a network security system designed to detect and prevent identified attacks from potential attackers (Forcepoint, 2019; Ponnusamy, Humayun, et al., 2022, Humayun, Niazi et al., 2022, Humayun, Almotilag et al., 2022). Essentially, an IPS encompasses all the capabilities of an IDS, having evolved from its predecessor. An IPS continuously monitors a user's network to detect possible malicious activities and gather information on them (Comodo Security Solutions, Inc., 2020; Seong et al., 2021). It promptly reports these findings to the system administrator, facilitating preventive actions such as firewall configuration to thwart future attacks. Another role of an IPS is to enforce corporate security policies and prevent network guests from violating these policies. There are numerous advantages to having an IPS installed on a network. Intrusion Detection and Prevention Systems (IDPS) represent the only fully automated solution for identifying and thwarting network attacks. IDPS combines the capabilities of IDS and IPS to automatically identify and mitigate threats that may exist on the network. This combination ensures network security by allowing IDS and IPS to work hand in hand. The majority of modern IDPS solutions employ hybrid systems and various techniques to ensure security.
Table 1.
Comparison between different types of IDS (Shurman et al., 2019).
Table 1.
Comparison between different types of IDS (Shurman et al., 2019).
Intrusion Detection and Prevention Systems (IDPS) possess several critical features, some of which are highlighted here. Firstly, an IDPS can effectively distinguish between normal and malicious network traffic, thereby safeguarding user privacy (Umich.edu, 2021; Adeyemo et al., 2019). It identifies and terminates malicious traffic being used in attacks. Additionally, IDPS offers multiple threat protection capabilities to thwart brute force password attempts, requiring the configuration of various security protocols to disrupt such attacks. Furthermore, IDPS can detect fingerprint attempts made by hackers to identify the target system's operating system, a crucial step in potential malicious attacks. At times, IDPS technologies can even modify the content of attacks by removing or replacing malicious components to render them benign. For instance, they can filter out infected files from emails to prevent them from reaching the recipient (VMware, 2021; Ponnusamy, Aun, et al., 2022).
In the larger context, IDPSs are designed to not only detect but also respond to attacks by blocking the intruder. The capability for real-time detection, enabling swift responses, is intricately connected with the system's ability to prevent an attack (Quincozes et al., 2021; Jayakumar et al., 2021).
In this research paper, the authors aim to design a new Intrusion Prevention System (IPS) to counter modern malicious attacks and intrusion activities. This endeavor involves the development of the IDPS with four primary components: the source of data, the analysis engine, preventive action, and reporting. The research team proposes that the IDPS will encompass three distinct technologies, namely NIPS, HIPS, and WIPS. The integration of these technologies is intended to enhance the overall efficiency of the IPS. Network-based IPS (NIPS) consolidates features from Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and firewalls, forming what is commonly referred to as the Gateway IDS (GIDS). Most NIPS systems utilize both signature-based detection and anomaly-based detection methods (Taylor, 2019). Host-based Intrusion Prevention System (HIPS) functions to monitor the host for any suspicious activities (Safensoft.com, 2020). The implementation of HIPS is essential because it can block malicious actions by hackers and promptly alert users, enabling them to make informed decisions (Din, 2021; Humayun et al., 2021, I. Hussain et al., 2022). HIPS tightly integrates with the operating system and the kernel to monitor and intercept system calls, preventing potential attacks.
Lastly, the IPS incorporates Wireless Intrusion Prevention System (WIPS) technology, designed to enhance the security of wireless networks. WIPS monitors the radio spectrum in the network's airspace for unauthorized access and activities (Just Firewalls, 2020; Zaman et al., 2022). It ensures compliance with standards and regulations, such as the Payment Card Industry Data Security Standard (PCI DSS).
2. COMPONENTS OF IDPS
The Intrusion Prevention System (IPS) presented in this paper is a hybrid that incorporates three distinct IDPS technologies: Network-Based, Wireless-Based, and Host-Based. Combining these three technologies results in the collection of diverse data from various sources to enhance the detection capabilities. Below, we will delve into the details of how each of these technologies employed in the proposed IPS acquires and utilizes information.
i. Network-Based
The Network-Based Intrusion Prevention System (NIPS) technology approach enables the proposed IPS to monitor and analyze traffic within a specific network segment and between various systems or devices (Mazhar et al., 2020; Alferidah & Jhanjhi, 2020, Muzamal et al., 2021). NIPS also scrutinizes a wide range of protocols, encompassing network, transport, and application protocols, including TCP/IP layer activities, to detect any signs of malicious or unauthorized activities. Deploying NIPS technology necessitates the use of sensors to gather data, with the number of sensors contingent upon the organization's network size. Fortunately, the addition of new sensors is a straightforward process. The Network Interface Cards (NICs) responsible for monitoring will be placed into promiscuous mode, allowing them to capture all incoming packets, irrespective of their destination IP address or MAC address (Scarfone and Mell, n.d.). In terms of architecture, this IPS proposes an inline approach, which compels network traffic to pass through it. This capability enables it to block traffic, when necessary, akin to a firewall. In some cases, certain sensors may function as hybrids (Conrad, Misenar, and Feldman, 2017). The architecture is further elucidated in the
Figure 1 below.
A Network-Based Intrusion Prevention System (NIPS) serves as an effective tool for network security. It can detect and categorize network hosts based on IP or MAC addresses, allowing for efficient management and monitoring. Furthermore, the NIPS excels in identifying the operating systems and their respective versions employed by these hosts, a crucial aspect in spotting potential vulnerabilities. It can also pinpoint application versions through port number monitoring and analysis of application-based communications, enhancing threat detection. Moreover, this system's capabilities extend to the identification of network features by capturing and analyzing generic network traffic data, including network device configurations. For example, it can determine the number of hops between devices, enabling the detection of any changes in network configuration.
ii. Wireless based.
The Wireless-Based Intrusion Prevention System (WIPS) technology approach shares similarities with NIPS, as it can be seen as a variant of NIPS, focusing on monitoring wireless network traffic and analyzing wireless protocols to detect any potentially malicious activities conducted on these protocols (GeeksforGeeks, 2019; Ponnusamy et al., 2019). The significance of WIPS in today's context lies in the increasing prevalence of portable devices, with their numbers growing each year. WIPS facilitates the monitoring of wireless local area networks (WLANs) that these portable devices commonly utilize. When deploying the components of a WIPS, they closely resemble those of a NIPS, except for the sensors. In WIPS, wireless sensors are used, and their functionality differs due to the intricate nature of wireless communications. There are two frequency bands to monitor, the 2.4 GHz and the 5 GHz, both of which are divided into channels to minimize the chances of missing a detection during channel switching. The sensors proposed for this purpose are equipped with robust antennas, enabling them to monitor various channels and cover larger areas (Wireless Intrusion Prevention System (WIPS), n.d; Zaman et al., 2021). The proposed architecture is depicted in the
Figure 2 below.
Typically, a Wireless-Based Intrusion Prevention System (WIPS) is adept at generating and maintaining a comprehensive inventory of Access Points (APs) and Wireless Local Area Network (WLAN) clients, even identifying peer-to-peer ad hoc clients. This roster is constructed using the Service Set Identifier (SSID) and the MAC addresses of the wireless network cards associated with these devices. The sensors integral to the WIPS architecture are highly sophisticated, employing fingerprinting techniques to cross-verify vendor information derived from MAC addresses, even in cases where spoofing is attempted (Samaher Al-Janabi and Ibrahim AlShourbaji, 2017; Zaman et al., 2022a). This list serves a crucial role in creating device profiles for WLAN identification and automatically removing outdated entries. Furthermore, the sensors diligently record the WLANs they encounter, distinguishing them based on their SSID. Network administrators can leverage this information to categorize entries into authorized WLANs, neighbouring WLANs, or potentially rogue WLANs. This data is invaluable for enhancing responses to detected events and facilitates the discovery of new WLANs, thus bolstering the overall security and management of wireless networks.
iii. Host-based
A Host-Based Intrusion Prevention System (HIPS) is a technology that primarily focuses on the behavior and events occurring within a single host to detect any suspicious activities within that system. HIPS is primarily designed for intrusion detection and prevention at the application level and operating system level. It has the capability to monitor various aspects, including network activity (both wireless and wired) specific to the host, file access, system logs, and OS version (Certificationkits.com, 2017; Hamid et al., 2019). When it comes to deploying the components of a HIPS, rather than using sensors as proposed for NIPS and WIPS, HIPS employs a software-based detection system known as an agent. Each agent is responsible for monitoring the activity of a single host, meaning each host will have its own dedicated agent. These agents can be developed to monitor either the server, the client host, or a specific application service. The architecture of the proposed HIPS technology is illustrated in the
Figure 3 below.
The kind of data an agent collects solely depends on its detection techniques and what kind of host it is designed to monitor. File systems can be effectively monitored through various techniques, including attribute checking, where agents routinely verify file permissions and access privileges to maintain security and integrity. Another crucial aspect of monitoring involves integrity checking, aimed at detecting any unauthorized alterations to files.
In the realm of application security, agents play a pivotal role by monitoring and analyzing application logs to identify potentially malicious activities. These logs contain critical information, ranging from significant changes in application configuration to failed authentication events, modifications in event logs, adjustments in login information, and more (Sharma et al., 2020; Zahra et al., 2023, Nawaz A et al., 2021, Zahra, F., Jhanjhi, N. Z., Brohi, S. N. et al., 2022). Additionally, agents are proficient at analyzing TCP/IP network packets specific to a host, enabling the identification of suspicious activities such as anomalous sequences of TCP/IP connections occurring within the host where they are deployed. Furthermore, agents possess the capability to scrutinize code using techniques like code behavior analysis. This enables the safe execution of code within a controlled sandbox environment for testing purposes. Agents can also perform vital functions like buffer overflow detection, identifying characteristics of stack and heap buffer overflows by closely monitoring memory segments, thus enhancing overall system security.
iv. Logging capabilities of the proposed IPS
Logs play a pivotal role in an IPS as they support the detection and analysis procedures. The specific information generated for logging varies based on the technology in use. While there may be overlaps in some common types of logged data, there can also be information unique to each specific IPS type. Below, we will delve into the logging capabilities of the proposed IPS, encompassing both the common and distinctive data logged by the WIPS, NIPS, and HIPS (Scarfone and Mell, n.d; Vijayalakshmi et al., 2021). Intrusion Prevention Systems (IPS) rely on a range of critical data elements for effective threat detection and response. Timestamps play a crucial role, providing a chronological record of malicious activities or attacks, enabling precise event tracking. Connection ID, also known as session ID, offers a unique identifier for sessions, such as TCP sessions, enhancing the system's ability to monitor and manage network traffic.
A severity rating system, sometimes referred to as impact and confidence, assists in evaluating the seriousness of specific activities or attacks, aiding in prioritizing response efforts. Protocols are essential data points that help identify the type of protocol associated with detected activities, spanning network, application, and transport layers, with common examples including TCP and UDP. Source and destination IP and MAC addresses are instrumental in identifying data flows' origin and destination. Beyond IP addresses, MAC addresses can provide insights into the vendor of a particular system, enriching network monitoring capabilities. Furthermore, IPS systems can scrutinize every byte transmitted or received over a connection, ensuring comprehensive monitoring. Lastly, the countermeasure information pertains to the preventive actions taken by the IPS to thwart intrusion attempts, forming a crucial component of an effective intrusion prevention strategy.
Data storage and the management of data retention are two critical factors that significantly impact the analysis process. In the context of the proposed IPS outlined in this paper, a centralized storage mechanism has been chosen to establish and maintain a central database. This approach allows for the consolidation of all verified and confirmed intrusions classified as true positives into a single logical central database. Such centralization facilitates the correlation of specific attacks or activities across NIPS, WIPS, and HIPS. The central database should possess backup capabilities, such as cloud-based backups or a cloned database, to ensure data security in case of any unforeseen issues affecting the primary database. Equally important is the duration for which data is retained, as it directly influences the efficiency of the IPS and maintenance costs. In the proposed IPS, the data collection points or sensors retain data locally on board for one week, after which it is backed up to the central storage and logging system, where it can be preserved for at least one year. This extended data retention period serves to enhance the analysis capabilities and support reporting within the proposed IPS (Scarfone and Mell, n.d.).
- B.
Analysis Engine
i. Anomaly detection: Distance-based methods
Distance-based methods are employed for anomaly detection, relying on the calculation of distances between two objects within a geometric representation. In our approach, we utilized a distance-based method implemented through the K-means procedure. The K-means algorithm was employed to train datasets containing both normal and anomalous traffic (Henriques et al., 2020; Almusaylim & Jhanjhi, 2018, Almrezeq, N. et al., 2021, Almusaylim et al., 2020).
We have opted for outlier detection as our preferred method because it excels at identifying anomalies that were not present in the trained datasets. This approach enables the rapid detection of attacks through distance calculations. When an observation deviates from the typical behavior, it's categorized as an outlier. In outlier detection, an object's distance is computed from the center of the normal cluster. If this distance exceeds a predefined threshold, the object is classified as an anomaly or abnormal. In
Figure 1, objects with distances exceeding the predefined threshold are considered anomalies (Li et al., 2019; Ubing et al., 2019). We've incorporated the distance-based method into our analysis engine as part of our goal to create an Intrusion Detection System (IDS) with minimal false alarms. This approach is robust against small variations in patterns and is straightforward to implement and understand. Its ability to detect anomalies with just a few calculations makes it suitable for real-time detection (A review on outlier/anomaly detection in time series data, 2020). The method proposed above is anomaly-based, meaning it can also identify patterns that are not predefined.
Figure 4.
Anomaly Based Detection (Li et al., 2019).
Figure 4.
Anomaly Based Detection (Li et al., 2019).
ii. Signature-based detection
In our Intrusion Prevention System (IPS), we have incorporated the Signature-based algorithm as well. This method operates by inspecting, recognizing, and comparing known patterns or signatures within incoming traffic or data packets. A database contains predefined patterns that the algorithm uses to retrieve data for comparison with the current stream of data. These predefined patterns can encompass single events or sequences of events. During the comparison process, if the algorithm detects a matching signature, it triggers an alarm and initiates the appropriate preventive measures (Thapa, Suman & Mailewa, Akalanka, 2020). We have chosen to incorporate the signature-based approach in our analysis engines for several reasons. First and foremost, it minimizes the occurrence of false alarms, reducing both false positives and false negatives. This reduces confusion regarding the prevention mechanism and prevents unnecessary actions, thus avoiding excessive computation. Secondly, the signature-based approach can be highly efficient, especially when the number of signatures is limited. These two factors contribute to preventing system slowdown. Thirdly, the signature-based approach provides precise information about the attacks occurring within the system, thanks to the predefined database. Ultimately, this algorithm operates in a straightforward and user-friendly manner.
Figure 5.
Signature-Based Detection (Hossain Faruk et al., 2021).
Figure 5.
Signature-Based Detection (Hossain Faruk et al., 2021).
iii. Rule-based detection
A rule-based Intrusion Detection System operates by monitoring system events and formulating a set of rules based on these observations. These rules are then used to make decisions about whether a particular pattern of activity is suspicious. Rule-based intrusion detection can be broadly categorized into two techniques: Rule-Based Anomaly Detection and Rule-Based Penetration Identification. While these techniques have their distinct features, there are also instances of overlap between them (Rule-Based Intrusion Detection, 2021; CS406: Rule-Based IDS | Saylor Academy, 2020).
Rule-based anomaly detection shares similarities with statistical anomaly detection, but it distinguishes itself by generating rules, which is not the case in statistical anomaly detection. In this approach, rules are primarily generated using historical audit records. These records are thoroughly analyzed to identify usage patterns and formulate rules that describe these patterns. The system recognizes past behavior patterns of users, programs, terminals, and other entities. Subsequently, it observes the current behavior to determine if it aligns with the historical behavior patterns. To achieve effectiveness in this type of intrusion detection, a substantial database of rules is essential (Anomaly Detection Rules - TechLibrary - Juniper Networks, 2019)
Rule-based penetration detection leverages predefined rules to detect known penetrations or attempts to exploit known vulnerabilities. Additionally, this approach can flag certain system rules as suspicious behavior, even if that behavior falls within established usage patterns. These rules are custom-tailored to the specific machine and operating system. The optimal way to create such rules is through the analysis of attack tools and scripts gathered from online sources.
- C.
Preventive action
a) Host-based Prevention system.
i. Antivirus
Antivirus software is a critical tool used for detecting, removing, and preventing malicious activities. Once installed on a computer, it operates in the background, offering real-time protection against virus attacks. In addition to safeguarding the computer, antivirus software can also protect files and hardware. It provides supplementary features like website blocking and customizable firewalls (What is Antivirus - Definition, Meaning & Explanation, 2021). Antivirus software can be available in both free and paid versions (What is Antivirus Software, 2021; Saeed et al., 2020, Sangkaran, T. et al., 2020). In our proposed Intrusion Prevention System (IPS), antivirus software will be installed on the host computer. This antivirus software can eliminate malicious code by scanning computer programs against a database of known attacks. Most modern antivirus programs are designed to update automatically, thereby safeguarding against the latest viruses and attacks (What is an antivirus product? Do I need one?, 2019). Once the IDS (Intrusion Detection System) detects any intrusion, the antivirus software can mark the affected file or program for deletion or render it inaccessible. Furthermore, it can notify the administrator when a virus is detected, enabling prompt action. Regular updates, either manual or automatic, are crucial for antivirus software to protect against the latest threats (Services and (AMP), 2021)
ii. Advanced antivirus
Advanced antivirus solutions have evolved significantly to effectively combat the growing complexity of modern cyber threats. While traditional signature-based antivirus software remains effective at detecting and preventing known malware, it struggles to keep up with the constant emergence of new and sophisticated threats. The introduction of advanced antivirus solutions marks a significant advancement in endpoint security. These solutions harness advanced technologies, including behavioral analysis, artificial intelligence (AI), and machine learning (ML), to identify threats by analyzing malicious intent, rather than solely relying on known malware signatures (Fahad, 2023; Nyunt et al., 2015). Furthermore, advanced antivirus solutions often incorporate EDR (Endpoint Detection and Response), MDR (Managed Detection and Response), and XDR (Extended Detection and Response) capabilities to provide comprehensive protection against evolving cyber threats. Advanced antivirus solutions harness the power of AI and machine learning to significantly enhance threat detection and response capabilities in various areas. Through behavioral analysis and anomaly detection techniques, they can identify deviations from typical behavior, effectively detecting zero-day and unidentified threats. The use of AI-driven classification and predictive analysis improves the ability to categorize threats, even new strains that may share characteristics with known ones, leading to improved accuracy. These solutions enable rapid response to emerging threats by automatic updates, minimizing the risk of compromise (Jacob, 2023).
Endpoint Detection and Response (EDR) plays a vital role in advanced antivirus solutions. EDR software effectively detects and monitors threats in real-time through behavioral analysis, even when specific threat signatures are unavailable. EDR also offers forensic capabilities, facilitating thorough investigations of security events. Additionally, EDR can include automated remediation and threat removal to promptly address potential threats (Fahad, 2023). Managed Detection and Response (MDR) services, as part of advanced antivirus solutions, are increasingly essential in addressing cybersecurity challenges. MDR providers offer a range of cybersecurity tools, including EDR, SIEM (Security Information and Event Management), network traffic analysis, and more, which helps organizations with limited resources or expertise to continuously monitor potential attacks. Extended Detection and Response (XDR) solutions represent the next phase in the evolution of antivirus technology. XDR offers enhanced analysis, intelligent alert suppression, and the ability to identify and correlate threats across various environments, providing a more comprehensive and streamlined approach to threat detection and response (George et al., 2021). Many well-known antivirus companies, including Kaspersky, CrowdStrike, Carbon Black, FireEye, and others, offer EDR, MDR, and XDR solutions to address the evolving cybersecurity landscape.
iii. Quarantine
The Intrusion Prevention System (IPS) will incorporate a robust defense strategy, combining antivirus software with a quarantine capability, and will be configured to thwart backdoor attacks, as outlined by Chen et al. (2018). The operational process is designed as follows:
Upon detecting malware, the IPS will act swiftly, isolating the threat by placing it in the antivirus software's vault to prevent any further damage to the system, in line with Chen et al. (2017). Following this, the antivirus software will initiate a comprehensive system-wide scan to root out any additional threats. If more malware or threats are uncovered, they will also be promptly quarantined, ensuring the system's security. Conversely, if no threats are detected during the scan, the system will be deemed "safe," thus safeguarding it against any further intrusion or potential harm. To ensure that users are kept well-informed about the system's security, the IPS will generate email notifications. These notifications will include an alarm and a detailed summary of recent security events, along with specific information on the steps taken to address them, thereby enhancing transparency and user awareness.
b) Network-Based Prevention System
i. Deep Packet Inspection
Deep Packet Inspection (DPI) is a technique used to meticulously examine the content of data packets as they traverse a monitored network. It's a powerful tool employed in intrusion prevention systems. Unlike standard packet inspection, which typically focuses on header information or destination ports, DPI scrutinizes a broader range of data and the actual content within the packets. DPI is adept at identifying, categorizing, blocking, and redirecting packets that may evade detection by regular packet filtering methods (Brooke, 2018). DPI operates based on specific criteria predefined by authorities. It determines how to handle detected threats, not only identifying them but also tracing their origins through packet content. This enables DPI to recognize threats to applications and services. When DPI identifies malware, it promptly notifies the user, allowing for proactive actions to mitigate potential harm (What Is Deep Packet Inspection (DPI)?, Fortinet, 2021). The implementation of DPI is crucial for bolstering security. Hackers often exploit websites to launch cyber-attacks. DPI can restrict traffic from specific websites, thereby safeguarding the network from potential risks. Moreover, it can uncover malicious packets that may go unnoticed by firewalls or those that are concealed (Chickowski, 2020).
ii. Genetic Algorithm
A genetic algorithm is rooted in biological evolution and natural selection theories, finding applications in artificial intelligence and computer search optimization. Genetic algorithms excel in efficiently exploring vast and unorganized datasets. They are particularly effective in tackling complex problems, whether constrained or unconstrained. Genetic algorithms are commonly employed in machine learning, problem optimization, and various other domains. Optimization seeks to enhance an existing solution by evaluating multiple input sets to derive the best possible result. In the realm of network security, genetic algorithms treat input sets as chromosomes, initially disorganized. They aim to provide the best and most optimal solutions to challenges. For example, this could involve devising a remedy for a detected data breach. To continually learn and improve, the program often incorporates machine learning algorithms and generates mutated offspring over time. These algorithms have valuable applications in the security field, including Intrusion Detection and Prevention Systems (IDPS) (Lambora et al., 2019).
Figure 6.
Genetic Algorithm Flow Chart (Lambora et al., 2019).
Figure 6.
Genetic Algorithm Flow Chart (Lambora et al., 2019).
- D.
Reporting
i) Information Collected.
To generate reports, the proposed system will collect a substantial amount of information. Within the IDS, two counters will be implemented. The first counter will increment after each intrusion, while the second counter will increase whenever an intrusion is successfully prevented. Additionally, two timers will be employed to track the time it takes to detect and prevent intrusions. The gathered data serves as the basis for generating statistical reports, which play a vital role in enhancing defense against various attacks and threats (Intrusions (IPS) Report, 2021). These reports serve as valuable tools to aid administrators in comprehending the network's vulnerability to different types of attacks. They offer insights into the necessity of additional network devices to fortify the network's security. Furthermore, the reports help pinpoint malicious sources that need attention and highlight suspicious IP addresses, enabling administrators to restrict incoming traffic from these specific sources (IDS/IPS tools - monitoring, 2021)
ii) How to report can improve the defense of the system.
The Intrusion Prevention report offers valuable insights for system enhancement. Information, such as the number of intrusions detected and prevented, holds significant importance for the system. It assists in developing plans and forecasts for improving the prevention system's effectiveness against intrusions. Moreover, it plays a crucial role in enhancing the decision-making process of administrators, enabling them to make informed choices that can prevent further intrusions (IDS/IPS tools - monitoring, 2021).
These reports serve as tools to monitor the progress and development of the intrusion prevention system. They allow for the observation of irregularities and trends, making it easier to diagnose issues effectively. Additionally, the reports act as guiding resources for administrators to thoroughly analyze system vulnerabilities and take proactive measures to address them.
iii) Interpretation of graphs on the reporting
The Intrusion Prevention System (IPS) will include a dedicated reporting and summary section for tracking all activities within a specific timeframe. This graphical user interface (GUI) will enable users to efficiently navigate and utilize the collected data, providing a more visual representation of the system's performance. Consequently, users can assess the effectiveness of the IPS and identify areas that require improvement. This functionality empowers users to make informed decisions and enhance the IPS by pinpointing specific problem areas (Tran et al., 2018).
In
Figure 7, we can see a snapshot of the reporting process, focusing on the number of intrusions detected. The graph depicts time on the x-axis and the count of intrusions detected on the y-axis. The initial portion of the graph displays a noticeable increase. This occurs because, upon launching the IPS, it begins detecting some intrusions. However, as time progresses, the system learns and, consequently, detects a greater number of intrusions. Furthermore, over time, we can expect the number of false positives and false negatives to decrease (Khraisat et al., 2019).
Figure 8 displays a graph where time is plotted on the x-axis, and the number of intrusions prevented is shown on the y-axis. The graph begins with a very low value, indicating that initially, the system detects a minimal number of intrusions. As time progresses and the system undergoes learning and enhancement, it becomes more capable of preventing intrusions. Towards the end of the graph, we observe an upward trend, signifying that the system's performance is improving over time. Consequently, the environment it protects becomes more secure, with the IPS effectively fulfilling its role (Khraisat et al., 2019).