Open Access
Subscription or Fee Access
Network Intrusion Detection & Prevention
Abstract
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.
Keywords
Intruders, Information Security, Real Time Ids, Attacks, Distributed System, Detection.
Full Text:
PDFReferences
Intrusion Detection : Network Security Beyond the Firewall by Terry Escamilla published by John Wiley and Sons
Intrusion Detection; An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response by Edward G. Amoroso published by intrusion.net books
Network Intrusion Detection – An Analyst’s Handbook. Northcutt, S., Zeltser, L., Winters, S. Frederick, K. K. and Ritchey, R. H. (2003)
http://www.cs.mu.oz.au/~cvzhou/pu b/icon05.pdf [6.]Dubin, J. Intrusion detection and prevention: More than a firewall.
http://www.securityfocus.com/infocus/1203
http://napps.nwfusion.com
http://www.cs.purdue.edu/people/
http://www.clark.net/pub/mjr
http://www.nwfusion.com/techinsider/2002/0624security.html
DOI: http://dx.doi.org/10.36039/AA122013005
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.