Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Meera Gandhi, S.K.Srivatsa
Pages - 49 - 60 | Revised - 15-02-2008 | Published - 30-02-2008
MORE INFORMATION
KEYWORDS
intruders, information security, real time IDS, attacks, signature
ABSTRACT
Intrusion detection is an important technology in business sector as well as an
active area of research. It is an important tool for information security. A Network
Intrusion Detection System is used to monitor networks for attacks or intrusions
and report these intrusions to the administrator in order to take evasive action.
Today computers are part of networked; distributed systems that may span
multiple buildings sometimes located thousands of miles apart. The network of
such a system is a pathway for communication between the computers in the
distributed system. The network is also a pathway for intrusion. This system is
designed to detect and combat some common attacks on network systems. It
follows the signature based IDs methodology for ascertaining attacks. A
signature based IDS will monitor packets on the network and compare them
against a database of signatures or attributes from known malicious threats. It
has been implemented in VC++. In this system the attack log displays the list of
attacks to the administrator for evasive action. This system works as an alert
device in the event of attacks directed towards an entire network.
1 | Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1. |
2 | Rao, P. M., & Raju, G. S. N. (2014). International Journal of Advanced Research in Computer Science and Software Engineering. International Journal, 4(12). |
3 | Nugroho, H. T., & Wicaksono, B. A. (2013). Utilizing Instant Messaging for Real-Time Notification and Information Retrieval of Snort Intrusion Detection System. ISICO 2013. |
4 | Manivannan, S. S., & Sathiyamoorthy, E. An Efficient and Accurate Intrusion Detection System to detect the Network Attack Groups using the Layer wise Individual Feature Set. |
5 | Devaraju, S., & Ramakrishnan, S. (2013). Performance comparison of intrusion detection system using various techniques–A review. ICTACT Journal on Communication Technology, 4(3), 802-812. |
6 | Dabbour, M., Alsmadi, I., & Alsukhni, E. (2013). Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT. International Journal of Security and its Applications IJAST, 7(1). |
7 | Arunachalam, V. P., & Ravichandran, T. A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback. International Journal of Computer Science and Security (IJCSS), 3(4), 272. |
8 | Barreto, rdmm right, cyberspace and networks: consumer protection challenges in social commerce. |
9 | Bucure?ti, U. P., & si Calculatoare, F. D. A. A Practical Analysis of Intrusion Detection Techniques on a Linux Environment. |
10 | Ruse, L. C. A Practical Analysis of Intrusion Detection Techniques on a Linux Environment. |
11 | Awodele, O., Onuiri, E. E., & Okolie, S. O. Vulnerabilities in Network Infrastructures and Prevention/Containment Measures. |
12 | Muda, Z., Yassin, W., Sulaiman, M. N., & Udzir, N. I. (2011). A K-Means and Naive Bayes learning approach for better intrusion detection. Information technology journal, 10(3), 648-655. |
13 | 4. Z.Muda, W.Yasin, M.N.Sulaiman and N.I.Udzir, “A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection” International Technology Journal, 10(3), pp. 648-656, 2011. |
14 | C. Manusankar, S. Karthik and T. Rajendran, “Intrusion Detection System with Packet Filtering for IP Spoofing”, in Proceedings of Communication and Computational Intelligence (INCOCCI), 2010 International Conference, Erode, 27-29 Dec. 2010, pp. 563 – 567. |
15 | L. Gheorghe, R. Rughinis and N. Tapus, “Attack Evaluation and Mitigation Framework”, in Proceedings, Networking and Services (ICNS), 2010 Sixth International Conference , Cancun, 7-13 March 2010, pp. 243 – 252. |
16 | Gandhi, M., & Srivatsa, S. K. (2010). Combination of RBF Algorithm and Filters Applied to Prevent Attacks in a Web Server. International Journal of Computational Intelligence Research, 6(2). |
17 | Sundararajan, T. V. P., & Shanmugam, D. A. (2009). Behavior based anomaly detection technique to mitigate the routing misbehavior in manet. International Journal of Computer Science and Security, 3(2), 62-75. |
18 | S. P. T. Vinay and A. Shanmugam, “Behavior Based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET”, International Journal of Computer Science and Security (IJCSS), 3(2), pp. 62 – 75, 2009. |
19 | E. Nikolova and V. Jecheva, “Anomaly Based Intrusion Detection Using Data Mining and String Metrics”, in Proceedings of Communications and Mobile Computing, CMC '09. WRI International Conference , Yunnan, 6-8 Jan. 2009, pp. 440 – 444. |
20 | A. S. Hosam, A. Mustafa, S. Ahmad and M. Abbas, “Exception Agent Detection System for IP Spoofing Over Online Environments”, International Journal of Computer Science and Information Security, 6(1), pp. 158-164, 2009. |
21 | S. Karthik, V. P. Arunachalam and T. Ravichandran, “A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback”, International Journal of Computer Science and Security (IJCSS), 3(4), pp. 272 - 279, 2009. |
1 | Google Scholar |
2 | ScientificCommons |
3 | Academic Index |
4 | CiteSeerX |
5 | iSEEK |
6 | Socol@r |
7 | ResearchGATE |
8 | Bielefeld Academic Search Engine (BASE) |
9 | Scribd |
10 | WorldCat |
11 | SlideShare |
12 | PDFCAST |
13 | PdfSR |
"Symantec-Internet Security threat report highlights (Symantec.com)", http://www.prdomain.com/companies/Symantec/newrelea ses/Symantec_internet_205032.htm | |
Cisco Systems, Inc., NetRanger-Enterprise-scale, Real-time, Network Intrusion Detection System, http://www.cisco.com/univercd/cc/td/doc/product/iaabu/netrangr/, 1998. | |
D. Oollmann, Cornpuler Security, John Wiley & Sons, 1999. | |
E. Biermann, E.Cloete, L.M. Venter, A comparison of Intrusion detection systems, Computers and Security, 20(2001)8, 676–683. [5] P. Ning and D. Xu. Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Transactions on Information and System Security, 7(4):591– 627, November 2004 | |
Herringshaw, C. (1997) ‘Detecting attacks on networks’, IEEE Computer Society Vol.30, pp.16 – 17. | |
http://www.karalon.com - Obtained Karalon IQ professional tool for testing our network intrusion detection system. | |
http://www.securityfocus.com – White papers for intrusion detection techniques and methodologies. | |
http://www.winpcap.org/ - Obtained drivers for packet capture with wpcap.dll and packet.dll driver. | |
International Standard IS0 7498.2, Information processing system - Open system interconnection – Basic reference model, PaR 2: Security architecture, 1989. | |
Internet Security Systems, Inc., RealSecure, http://www.iss.net/prod/rsds.html, 1997. | |
Intrusion.com, Intrusion SecureHost, white paper available at: www.intrusion.com/products/hids.asp , 2003. | |
J. Van Ryan, SAIC's Center for Information Security, Technology Releases CMDS Version 3.5, http://www.saic.com/news/may98/news05-15-98.html, 1998. | |
Komninos T, Spirakis P., Stamatiou et.al..: A Software Tool for Distributed Intrusion Detection in Computer Networks (Helena) (Best Poster presentation in PODC 2004). | |
Komninos T., Spirakis P.: Dare the Intruders, Ellinika Grammata and CTI Press (2003). | |
N. Weaver, V. Paxson, S. Staniford and R. Cunningham, A Taxonomy of Computer Worms, In Proceedings of the The Workshop on Rapid Malcode (WORM 2003), held in conjunction with the 10th ACM Conference on Computer and Communications Security, Washington, DC, October 27, 2003. | |
NFR Network Intrusion Detection, http://www.nfr.com/products/NID/, 2001. | |
P. Ning and D. Xu. Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Transactions on Information and System Security, 7(4):591– 627, November 2004 | |
Patwardhan, A. Parker, J., Joshi,A., Karygiannis, A., and Iorga,M. “Secure Routing and Intrusion Detection in Ad Hoc Networks”, Third IEEE International Conference on Pervasive Computing and Communications, Kauai Island, Hawaii, 2005. | |
R. Lippmann, The Role of Network Intrusion Detection, In Proceedings of the Workshop on Network Intrusion Detection, H.E.A.T. Center, Aberdeen, MD, March 19-20, 2002. | |
R.G. Bace, Intrusion Detection. Macmillan Technical Publishing, 2000 | |
SNORT Intrusion Detection System, www.snort.org, 2004. | |
Snort-Wireless Intrusion Detection, http://snort-wireless.org, 2003.] | |
Symantec Security Response, W32.ExploreZip.L.Worm, http://securityresponse.symantec.com/avcenter/venc/data/w32.explorezip.l.worm.html , January 2003. | |
Wheel Group Corporation, Cisco Secure Intrusion Detection System, http://www.cisco.com/univercd/cc/td/doc/product/iaabu/csids/index.htm , 2004 | |
Mr. Meera Gandhi
- India
meera.gandhi@gmail.com
Mr. S.K.Srivatsa
- India
|
|
|
|
View all special issues >> | |
|
|