Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Overview of Strategy Based Approaches in Combating Intrusion and Threats


Affiliations
1 S N S College of Technology, Coimbatore, India
2 Computer Science Department, Angel College of Engineering and Technology, Tirupur, India
3 Computer Science Department, S N S College of Technology, Coimbatore, India
     

   Subscribe/Renew Journal


Recently the competitiveness of any Security product is determined by the efficiency to deal with spy ware and to manage any given threat from detection to full removal. Detecting and removing installed and active threats presents many challenges, particularly where multiple files, processes and registry components are involved. The ability for these components to be updated from the Internet at any time and with varying frequency only complicates the issue further. In some cases the threats can be removed in safe mode only, but the Antivirus products are normally inactive in safe mode, this is a major challenge for the Security products. Some ischolar_main kits affects the host files which makes website redirection issues and finally make the Antivirus product out of phase. This paper looks at how organizations and users can benefit from a more integrated, strategy-driven approach to protecting the network at all levels and controlling both user access and behavior by combating modern threats. This paper also describes about the recent infections like ischolar_main kits which cannot be automatically removed by the Antivirus products and some of the manual removal techniques used for those infections and the general locations where the threats gets affected. Intrusion Detection System (IDS) has been used to secure these environments for sharing their data over network and host based IDS approaches. The rapid improvements of intrusions in internet and other networks are the main factors responsible for the propagation of different threats and vulnerabilities in the computing environment. Now a days the Ids makes use of the signature based detection approach which detects the actions based on analyzing the patterns such as text, password, time etc. So this will create difficulties in updating information and detecting unknown attacks. In this paper we make use of an improved EADS (Exception Agent Detection System) for making the header information secure.. We establish the conditions under which the IDPF framework works correctly in that it does not discard packets with valid source addresses. In this paper we also propose an improved behavioral method for combating the unknown threats other that the usual context and content scanning techniques.

Keywords

Threats, Antivirus, Malware, Security Guard, Spam.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 230

PDF Views: 3




  • An Overview of Strategy Based Approaches in Combating Intrusion and Threats

Abstract Views: 230  |  PDF Views: 3

Authors

C. Manusankar
S N S College of Technology, Coimbatore, India
K. Ayyappadas
S N S College of Technology, Coimbatore, India
T. Rajendran
Computer Science Department, Angel College of Engineering and Technology, Tirupur, India
S Karthik
Computer Science Department, S N S College of Technology, Coimbatore, India

Abstract


Recently the competitiveness of any Security product is determined by the efficiency to deal with spy ware and to manage any given threat from detection to full removal. Detecting and removing installed and active threats presents many challenges, particularly where multiple files, processes and registry components are involved. The ability for these components to be updated from the Internet at any time and with varying frequency only complicates the issue further. In some cases the threats can be removed in safe mode only, but the Antivirus products are normally inactive in safe mode, this is a major challenge for the Security products. Some ischolar_main kits affects the host files which makes website redirection issues and finally make the Antivirus product out of phase. This paper looks at how organizations and users can benefit from a more integrated, strategy-driven approach to protecting the network at all levels and controlling both user access and behavior by combating modern threats. This paper also describes about the recent infections like ischolar_main kits which cannot be automatically removed by the Antivirus products and some of the manual removal techniques used for those infections and the general locations where the threats gets affected. Intrusion Detection System (IDS) has been used to secure these environments for sharing their data over network and host based IDS approaches. The rapid improvements of intrusions in internet and other networks are the main factors responsible for the propagation of different threats and vulnerabilities in the computing environment. Now a days the Ids makes use of the signature based detection approach which detects the actions based on analyzing the patterns such as text, password, time etc. So this will create difficulties in updating information and detecting unknown attacks. In this paper we make use of an improved EADS (Exception Agent Detection System) for making the header information secure.. We establish the conditions under which the IDPF framework works correctly in that it does not discard packets with valid source addresses. In this paper we also propose an improved behavioral method for combating the unknown threats other that the usual context and content scanning techniques.

Keywords


Threats, Antivirus, Malware, Security Guard, Spam.