INTRUSION DETECTION SYSTEM ON COMPUTER NETWORK SECURITY (IDS-CNS)

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 1, Issue 2, No 3, 2013.

Copyright: All Rights Reserved ©2013

Year of Publication: 2013

Author: M.Sathish Kumar,R.Vasanthi

Reference:IJCS-016

View PDF Format

Abstract

Intrusion Detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. An Intrusion Detection System (IDS) is software that automates the intrusion detection process. An Intrusion Prevention System (IPS) is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents. Here we propose a distributed intrusion detection system (DIDS). It allows administrators to gather all information about anomalous traffic assists in network crime investigation and also helps in preventing port scanning attacks in a network .This system also carries out intrusion detection and monitors malicious activities by using honey pot network. Hence rules development work, carried out for such DIDS has been quite sensitive and vital task.

References

I. Distributed Intrusion Detection System(DIDS) Using Snort Technology, S.Dharani, M.Saranya,Page no 69,ISBN 938054310-7 National Conference proceedings. II. Intrusion Detection Techniques for Mobile Wireless Networks *,Yongguang Zhang HRL Laboratories LLC, Malibu, California. Mobile Networks and Applications (2003) 1 16,Wenke Lee, Yi-An Huang,College of Computing, Georgia Institute of Technology III. GUIDE TO INTRUSION DETECTION AND PREVENTION SYSTEMS (IDPS),Karen Scarfone Peter Mell.Computer Security Division,Information Technology Laboratory ,National Institute of Standards and Technology ,Gaithersburg, MD 20899-8930.February 2007 U.S. IV. Battlefield Intrusion Detection System, Robert K.Cunningham,David A.Kassay,Cynthia D.McLain,MIT Lincoln Laboratory,Lexing,MA. V. Intrusion Detection System as Evidence,Peter Sommer,Computer Security Research Centre,London School of Economics & Political Science. P.M Sommer@lse.ac.uk VI. Intrusion Detection System as Evidence,Peter Sommer,Computer Security Research Centre,London School of Economics & Political Science. P.M Sommer@lse.ac.uk.


Keywords

IDS, Security, Attacks, Intrusion, Detection, DIDS,IPS.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog