Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Network Intrusion Detection & Prevention


Affiliations
1 Department of Computer Science. A.D.M College For women (Autonomous), Nagapattinam, India
2 Computer Science, A.D.M College for Women(Autonomous), Nagapattinam, India
3 Computer Science, A.D.M College for Women(Autonomous), Nagapattinam, India
     

   Subscribe/Renew Journal


Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.

Keywords

Intruders, Information Security, Real Time Ids, Attacks, Distributed System, Detection.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 314

PDF Views: 3




  • Network Intrusion Detection & Prevention

Abstract Views: 314  |  PDF Views: 3

Authors

K. Arul Marie Joycee
Department of Computer Science. A.D.M College For women (Autonomous), Nagapattinam, India
R. Parkavi
Computer Science, A.D.M College for Women(Autonomous), Nagapattinam, India
R. Senthikumari
Computer Science, A.D.M College for Women(Autonomous), Nagapattinam, India

Abstract


Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.

Keywords


Intruders, Information Security, Real Time Ids, Attacks, Distributed System, Detection.



DOI: https://doi.org/10.36039/ciitaas%2F5%2F6%2F2013%2F106820.244-247