Open Access Open Access  Restricted Access Subscription or Fee Access

Network Intrusion Detection & Prevention

K. Arul Marie Joycee, R. Parkavi, R. Senthikumari

Abstract


Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.

Keywords


Intruders, Information Security, Real Time Ids, Attacks, Distributed System, Detection.

Full Text:

PDF

References


Intrusion Detection : Network Security Beyond the Firewall by Terry Escamilla published by John Wiley and Sons

Intrusion Detection; An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response by Edward G. Amoroso published by intrusion.net books

Network Intrusion Detection – An Analyst’s Handbook. Northcutt, S., Zeltser, L., Winters, S. Frederick, K. K. and Ritchey, R. H. (2003)

http://www.cs.mu.oz.au/~cvzhou/pu b/icon05.pdf [6.]Dubin, J. Intrusion detection and prevention: More than a firewall.

http://www.securityfocus.com/infocus/1203

http://napps.nwfusion.com

http://www.cs.purdue.edu/people/

http://www.clark.net/pub/mjr

http://www.nwfusion.com/techinsider/2002/0624security.html




DOI: http://dx.doi.org/10.36039/AA122013005

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.