INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIV, Issue VI, June 2025
www.ijltemas.in Page 806
Nilesh B. Nanda [7] contributed work on classification methods in IDS. The study discusses the limitations of anomaly-based
systems and categorizes hybrid NIDS, which include alert mechanisms to notify administrators of detected threats.
Kanubhai K. Patel [9] also worked on the implementation of IDS. His paper presents the architecture of a hybrid intrusion
detection system, emphasizing its integration with hybrid computing environments to enhance security management.
Architecture of our Hybrid IDS
The Data Acquisition Module incorporates multiple sensors, which are deployed either on individual hosts or specific network
segments. Sensors placed on individual hosts monitor packets as they enter and leave the host, whereas those on network
segments analyze packets moving through the segment. For optimal detection, sensors should be positioned to capture all
incoming and outgoing packets. However, segment-based sensors may fail to capture all traffic under high loads. Although
installing sensors on each host may require significant effort, it improves detection accuracy. Ensuring full packet capture is
essential to prevent any intrusion from bypassing the IDS. In our implementation, Snort is utilized on a Windows operating
system with WinPcap for packet capture.
The Signature Database stores a collection of known signatures, rules, or criteria used to compare against packets captured by
the sensors. This database must be installed alongside the IDS software and hardware. Once set up, the sensors collect packet
data from the network and reassemble them, accounting for issues such as out-of- order delivery, duplication, or high-speed
arrival. Therefore, data storage is required to temporarily store packets for accurate analysis [9].
The Analyzer Module processes these packets by matching them against known patterns in the Signature Database using a
pattern-matching algorithm, specifically the Aho-Corasick algorithm [1]. If a match is found, it identifies a known attack and sends
an alert to the Countermeasure Module, while also logging the event. If no match is detected, the data is forwarded to the
Anomaly Detector, which applies pattern mining techniques to identify unusual activity.
If the Anomaly Detector detects suspicious behavior, it notifies the Signature Generator, which then formulates a new rule or
signature and updates the Signature Database accordingly.
Upon receiving an alert, the Countermeasure Module notifies the system administrator through pre-configured methods such as
pop-up alerts or email notifications. In addition to these notifications, the module can be configured to execute automatic
responses when alerts are triggered.
This module is also used by network administrator to evaluate the alert message and to take proper actions such as dropping
a packet or closing a connection. The administrator can anticipate having to fine-tune the signature database to account for
situations that seem to the IDS to be intrusions but that are actually legitimate traffic. For example, an adjustment might be made
to enable traffic that might otherwise be seen by the firewall as suspicious, such as a vulnerability scan performed by a scanning
device located at a particular IP address. The IDS could be configured to add a rule that changes the action performed by the
IDS in response to traffic from that IP address from Alarm to Drop.
Conclusion
The proposed of Hybrid model is Detect malicious packets within network traffic and stop intrusions dead, blocking the aberrant
traffic automatically before it does any damage in Hybrid network rather than simply giving an alert as, the malicious load has
been delivered. It were invented independently to resolve ambiguities in network monitoring by placing prevention.
Future Scope
The proposed model can be implemented in very low cost and within short time.
References
1. Yashashree Dawle, Manasi Naik,Sumedha Vande,Nikita Zarkar ,”Reserch of Database Security Using Intrusion Detection
System” International Journal of Latest Engineering Research and Applications (IJLERA) ISSN: 2455-7137 Volume
– 02, Issue – 03, March – 2017, PP – 01-06.
2. Janu Gupta, Jasbir Singh” Detecting Anomaly Based Network Intrusion Using Feature Extraction and Classification
Techniques” International Journal of Advanced Research in Computer Science,volume 8, No. 5, May – June 2017.
3. Atmaja Sahasrabuddhe, Sonali Naikade, Akshaya Ramaswamy, Burhan Sadliwala , Prof.Dr.Pravin Futane,” Survey on
Intrusion Detection System using Data Mining Techniques, International Research Journal of Engineering and
Technology (IRJET)Volume:04 Issue: 05 May -2017 .
4. Kanubhai K. Patel, Bharat V. Buddhadev”Research of An Architecture of Hybrid Intrusion Detection System”
International Journal of Information & Network Security (IJINS) Vol.2, No.2, April 2013, pp. 197~202.
5. Amaan Anwar & Syed Imtiyaz Hassan,” Applying Artificial Intelligence Techniques to Prevent Cyber Assaults
“International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 5 (2017), pp.
6. Ghosh, A. Shinde, and N. Pissinou, “A Survey on Network Intrusion Detection using Deep Learning Techniques,” IEEE
Access, vol. 9, pp. 21932–21957, 2021. DOI: 10.1109/ACCESS.2021.3056066
7. B. Subba, S. Biswas, and S. K. Das, “A Neural Network- Based System for Intrusion Detection and Attack Classification,”