Open Access Open Access  Restricted Access Subscription Access

A New Distributed Intrusion Detection System in Computer Network: An Approach to Detect Malicious Intrusion Threats at Initial Stage


Affiliations
1 Department of Computer Application, Career Point University, Kota, Rajasthan, India
 

Internet is a blessing for human community modern days and use of network is indispensable in present time. Use of networks and internet has also brought large numbers of security threats to our database and information systems. There are so many intrusion attacks on public and private networks. Main objective of this research work to study about problem associated with intrusion in network system and analyzes the use of intrusion Detection systems. Scrutinize the use of various IDS and develop a new IDS which should be most effective and easy to use also cost effective for users. So, we will be presenting our newly developed application based IDS which is to be suitable way to detect threat in the network system which can be cost effective and easy to use also it should have instantaneous alert system to notify intrusion to security professionals.


Keywords

IDS, DoS, NIDS, HIDS, DIDS.
User
Notifications
Font Size

  • J. Allen et al., State of the Practice of Intrusion Detection Technologies, Tech Report CMU/ SEI-99-TR-028, Carnegie Mellon Univ., Software Engineering Inst., Pittsburgh, 2000
  • Jennifer Jabbusch , “IDS vs. IPS: How to know when you need the technology”, 22 November 2010
  • Kent, Karen & Warnock, Matthew (2004). Intrusion Detection Tools Report, 4th Edition. Herndon, VA: Information Assurance Technology Analysis Center (IATAC).
  • Pete Lindstrom, “Intrusion prevention systems (IPS): Next generation firewalls”, A Spire Research Report – March 2004 by, Spire Security
  • Parveen Sadotra(CEH) and Dr. Chandrakant Sharma, “Transformation in Building More Intelligent Intrusion System: A review” presented in ICEECSIT- 17 at New Delhi, India, PP. 1 - 5 6. Debar, H., An Introduction to Intrusion Detection Systems, IBM Research, Zurich Research Laboratory
  • Jan Vykopal, “Security Analysis of a Computer Network”, Masaryk University Brno, master thesis, 2008.
  • Charlie Kaufman, Radia Perlmon and Mike Speciner; Network Security; Private Communication in a Public World, 2nd Edition, Prentice Hall of India
  • William Stallings, Cryptography and Network Security: Principles and Practices, Pearson Education, 4th Edition, 2011.
  • Jeevaa Katiravan, C. Chellappan and J. Gincy Rejula Detecting the Source of TCP SYN Flood Attack using IP Trace Back European Journal of Scientific Research ISSN 1450-216X Vol.71 No.1 (2012), pp. 78-84
  • V. Jyothsna, V. V. Rama Prasad and K. Munivara Prasad “A Review of Anomaly based Intrusion Detection Systems” International Journal of Computer Applications (0975–8887) Volume 28-No.7, August 2011
  • Asmaa Shaker Ashoor and Prof. Sharad Gore “Importance of Intrusion Detection System (IDS)” International Journal of Scientific & Engineering Research, Volume 2, Issue 1, January-2011 ISSN 2229-5518
  • Firkhan Ali Bin Hamid Ali and Yee Yong Len “Development of Host Based Intrusion Detection System for Log Files” IEEE symposium on business, engineering and industrial application(ISBEIA) langkawi, malaysia 2011
  • Chung-Ming Ou and C.R. Ou “Immunity-inspired Host-based Intrusion Detection Systems” 2011 Fifth IEEE International Conference on Genetic and Evolutionary Computing.
  • Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi and Sukumar Nandi “A Host Based DES Approach for Detecting ARP Spoofing” IEEE Conferences 2011
  • Bin Zeng, Lu Yao, ZhiChen Chen “A Network Intrusion Detection System with the Snooping Agents” IEEE International Conference on Computer Application and System Modeling (ICCASM 2010) 2010.
  • LIN Ying, ZHANG Yan and OU Yang-Jia “The Design and Implementation of Host-based Intrusion Detection System” Third IEEE International Symposium on Intelligent Information Technology and Security Informatics 2010
  • Anuradha and Anita Singhrova A Host Based Intrusion Detection System for DDoS Attack in WLAN IEEE International Conference on Computer & Communication Technology (ICCCT)-2011
  • Chundong Wang, Quancai Deng, Qing Chang, Hua Zhang and Huaibin Wang “ A New Intrusion Detection System Based on Protocol Acknowledgement” IEEE 2010
  • Parveen Sadotra et al, A Review on Integrated Intrusion Detection System In Cyber Security International Journal of Computer Science and Mobile Computing, Vol.5 Issue.9, September- 2016, pg. 23-28.
  • M.A., Faizal, Mohd Zaki M., Shahrin Sahib, Robiah Y., Siti Rahayu S., and Asrul Hadi Y.. “Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System”, 2010 Second International Conference on Network Applications Protocols and Services, 2010.
  • Parveen Sadotra and Chandrakant Sharma. A Survey: Intelligent Intrusion Detection System in Computer Security. International Journal of Computer Applications 151(3):18-22, October 2016.
  • Fessi, B.A.. “A decisional framework system for computer network intrusion detection”, European Journal of Operational Research, 20070316

Abstract Views: 282

PDF Views: 1




  • A New Distributed Intrusion Detection System in Computer Network: An Approach to Detect Malicious Intrusion Threats at Initial Stage

Abstract Views: 282  |  PDF Views: 1

Authors

Parveen Sadotra
Department of Computer Application, Career Point University, Kota, Rajasthan, India
Chandrakant Sharma
Department of Computer Application, Career Point University, Kota, Rajasthan, India

Abstract


Internet is a blessing for human community modern days and use of network is indispensable in present time. Use of networks and internet has also brought large numbers of security threats to our database and information systems. There are so many intrusion attacks on public and private networks. Main objective of this research work to study about problem associated with intrusion in network system and analyzes the use of intrusion Detection systems. Scrutinize the use of various IDS and develop a new IDS which should be most effective and easy to use also cost effective for users. So, we will be presenting our newly developed application based IDS which is to be suitable way to detect threat in the network system which can be cost effective and easy to use also it should have instantaneous alert system to notify intrusion to security professionals.


Keywords


IDS, DoS, NIDS, HIDS, DIDS.

References





DOI: https://doi.org/10.13005/ojcst%2F10.02.10