Filters








8,660 Hits in 7.0 sec

Host-based Intrusion Detection and Prevention System (HIDPS)

Kopelo Letou, Dhruwajita Devi, Y. Jayanta Singh
2013 International Journal of Computer Applications  
This paper is deliberated to provide a model for Host-based Intrusion Detection and Prevention (HIDPS).  ...  General Terms Host-based Intrusion Detection and Prevention System.  ...  Network-based Intrusion Detection and Prevention System (NIDPS): monitors the entire network for suspicious traffic by analyzing protocol activity. 2.  ... 
doi:10.5120/12136-8419 fatcat:hq5bmwbupjc6rk75o3chxg5aga

A Hybrid Adaptive Development Algorithm and Machine Learning Based Method for Intrusion Detection and Prevention System

K. NandhaKumar, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
Network Intrusion detection and prevention Systems (NIDPS) are employed in monitoring a network which safeguards user integrity, privacy thereby ensuring the data security and availability in a network  ...  The signatures for the DARPA 99 data set have been updated during the implementation of intrusion prevention system on a real-time basis.  ...  Honeypot deployment will be based on the decoy network which monitors the internal or external threats in a network system.  ... 
doi:10.17762/turcomat.v12i5.1789 fatcat:3smp2ehhxfetnntpanch3jryu4

Systematic Literature Review over IDPS, Classification and Application in its Different Areas

Shehroz Afzal, Jamil Asim
2021 STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH  
Presenting a classification of network anomaly IDS evaluation metrics and discussion on the importance of the feature selection.  ...  Network security is vital for any organization connected to the Internet.  ...  Acknowledgement Authors are thankful to the Editorial Team for their constructive support.  ... 
doi:10.52700/scir.v3i2.58 fatcat:xrczlxjg5ncclf2ftxyw3y5zce

Deep Learning Approaches for Intrusion Detection

Azar Abid Salih, Siddeeq Y. Ameen, Subhi R. M. Zeebaree, Mohammed A. M. Sadeeq, Shakir Fattah Kak, Naaman Omar, Ibrahim Mahmood Ibrahim, Hajar Maseeh Yasin, Zryan Najat Rashid, Zainab Salih Ageed
2021 Asian Journal of Research in Computer Science  
Intrusion detection is one of the leading research problems in network and computer security.  ...  This paper investigates and presents Deep Learning (DL) techniques for improving the Intrusion Detection System (IDS).  ...  An Intrusion prevention system (IPS) is a device or software that has the working as an intrusion detection system for analyzing and monitoring network traffic and malicious attack prevention and stops  ... 
doi:10.9734/ajrcos/2021/v9i430229 fatcat:phpioi3zinck7o7izh6nqbdwz4

A Hybrid Data Loss Detection and Prevention Framework Using Snort Signature Based Detection System and Knowledge Based Anomaly Detection System

Henry Gekone Ondieki, Dr. Kennedy Ogada, Prof. Wilson Cheruiyot
2020 International Journal of Computer Applications Technology and Research  
This study makes a contribution trough use of DLPs to propose hybrid data loss detection and prevention system.  ...  This calls for the development of a new and improved data security architecture creating the new data leakage prevention systems (IDSs/IPSs).  ...  The method proved effective on evaluation for preventing data loss on a network and in dealing with considered attacks on data. 9 proposed a hybrid intrusion detection system in which a normal profile  ... 
doi:10.7753/ijcatr0902.1005 fatcat:3f4qbgtwcfapjan6xmvybharsu

Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review

Farzana Kausar Gondal
2021 Innovative Computing Review  
An Intrusion Detection System (IDS) identifies the attacks by analysing the events, considered undesirable from a security perspective, in systems and networks.  ...  It should be the responsibility of IDS to analyse a huge amount of data without overloading the networks and monitoring systems.  ...  A Mobile Agent-based Programmable Hybrid Intrusion Detection System (APHIDS) [27] 1) Framework: APHIDS uses a network-based framework and places an agent engine in the network at each site.  ... 
doi:10.32350/icr.0102.05 fatcat:hs22rden4fcgxenxcepxoij4zu

Characterizing Network Intrusion Prevention System

Deris Stiawan, Abdul Hanan Abdullah, Mohd. Yazid Idris
2011 International Journal of Computer Applications  
On contrary, IPS can be used to alarm for attacks within a network and provide for acting on attack preventive with Firewall and IDS function mechanism.  ...  Unlike traditional Intrusion Detection System (IDS), Intrusion Prevention System (IPS) has additional features to secure computer network system.  ...  They present the methods based on the analytic traffic flows with divided in case study. An essential in network security is to monitor and analyzed network traffic for profiling user behavior.  ... 
doi:10.5120/1811-2439 fatcat:pirx3fj76faibm3anbzmhdkx6e

A Classification of Intrusion Detection Systems in the Cloud

Marwa Elsayed, Mohammad Zulkernine
2015 Journal of Information Processing  
Therefore, the effectiveness of the IDS is a crucial issue for cloud security.  ...  Security is one of the most prominent challenges that hinder the acceleration of cloud adoption. Intrusion detection systems (IDSs) can be used to increase the security level of cloud environments.  ...  It can perform a host-based, a network-based, or a hybrid intrusion detection.  ... 
doi:10.2197/ipsjjip.23.392 fatcat:toie6prmtzfw7glfqcee3namre

An overview of Intrusion Detection and Prevention Systems [article]

Keturahlee Coulibaly
2020 arXiv   pre-print
One of these systems are Intrusion Detection Systems (IDS), which can be used as the first defence mechanism or a secondary defence mechanism of a threat or an attack.  ...  It will detail typical benefits and limitations to using IDSs, IPSs and the hybrids (such as Intrusions Detection Prevention Systems (IDPSs and more)) which will be discussed further.  ...  The study of IDSs has provided a realization of the importance of the position played by IPS, the Host Based IPS and the Network-Based IPS in security.  ... 
arXiv:2004.08967v1 fatcat:2oqzco7vj5g5paixkm4jqmavye

A Hybrid Scheme based on Big Data Analytics using Intrusion Detection System

Shaik Akbar, T. Srinivasa Rao, Mohammed Ali Hussain
2016 Indian Journal of Science and Technology  
Objective: Network security plays a key role for many organizations.  ...  Host based and network based Intrusion Detection Systems are available in the market depending upon the detection technology used by them.  ...  A. Francies Xavier SJ, Secretary and Director of Andhra Loyola Institute of Engineering and Technology, Vijayawada Supports us in making this paper a very highly achievable hybrid system. Fr. M. L.  ... 
doi:10.17485/ijst/2016/v9i33/97037 fatcat:lml2pzooj5hqboiecdtj6cwqe4

A Global Hybrid Intrusion Detection System for Wireless Sensor Networks

Yassine Maleh, Abdellah Ezzati, Youssef Qasmaoui, Mohamed Mbida
2015 Procedia Computer Science  
In this paper, we propose a hybrid, lightweight intrusion detection system for sensor networks.  ...  Many researchers are currently focusing on the security of wireless sensor networks (WSNs).  ...  Hai et al. 4 proposed a hybrid, lightweight intrusion detection system integrated for sensor networks, based on the model proposed by Roman et al. 5 .  ... 
doi:10.1016/j.procs.2015.05.108 fatcat:2anuhmo6tnetfbqqifartwjjki

A Survey of Anomaly Detection Approaches in Internet of Things

Morteza Behniafar, Alireza Nowroozi, Hamid Reza Shahriari
2018 Isecure  
Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes.  ...  In this regard, Anomaly based Intrusion Detection Systems identify anomalous behavior of the network and consequently detect possible intrusion, unknown and stealth attacks.  ...  In [42, 43] Granjal and Pedroso [58] proposed a hybrid intrusion detection system for CoAP based network.  ... 
doi:10.22042/isecure.2018.116976.408 dblp:journals/isecure/BehniafarNS18 fatcat:eu5idlzo6vgwlhny2plx6hac2u

A HYBRID APPROACH OF INTRUSION DETECTION SYSTEM BASED ON NEURAL NETWORK AND NORMALIZATION

Kavita Patil, Dr. Bhupesh Gour, Mr. Deepak Tomar
2016 INTERNATIONAL JOURNAL ONLINE OF SCIENCE  
For protecting the network, first there is a need to detect the attacks then take the proper action regarding it.  ...  In this paper, proposed methods based on Neural Network is described that provides better way of attack detection, that are required in various applications of security such as network forensics, portable  ...  The intrusion-prevention-system is also a security/threat prevention technique for the network which monitors the traffic flows of the network to identify and secure the network's susceptibility that is  ... 
doi:10.24113/ijoscience.v2i2.76 fatcat:f3ffex7xwrdize2frt4s74hqmy

An Adaptive Hybrid Multi-level Intelligent Intrusion Detection System for Network Security

P. Ananthi, P. Balasubramanie
2014 Research Journal of Applied Sciences Engineering and Technology  
Intrusion Detection System (IDS) plays a vital factor in providing security to the networks through detecting malicious activities.  ...  The anomaly detection is based on Bayesian Networks and then the misuse detection is performed using Adaptive Neuro Fuzzy Inference System (ANFIS).  ...  Hybrid intrusion detection system for enhancing the security of a cluster-based wireless sensor network: In Wireless Sensor Networks (WSNs) (Jie Yang et al., 2010) , they are more significant to various  ... 
doi:10.19026/rjaset.7.680 fatcat:5uxsj67kinhoboymai2wkebfye

Survey anomaly detection in network using big data analytics

Y.S. Kalai Vani, Krishnamurthy
2017 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS)  
Analysing network flows, logs, and system events has been used for intrusion detection. Network flows, logs, and system events, etc. generate big data.  ...  This paper presents methods and subsequent evaluation criteria for network intrusion detection, stream data characteristics and stream processing systems, feature extraction and data reduction, conventional  ...  W56HZV-08-C-0236, through a subcontract with Mississippi State University (MSU), and was completed for the Simulation Based Reliability and Safety (SimBRS) research program at MSU.  ... 
doi:10.1109/icecds.2017.8390083 fatcat:6gij7behqjhezefwcxoflowtqe
« Previous Showing results 1 — 15 out of 8,660 results