Methodologies for Intrusion Detection & Prevention

نویسنده

  • Kamini Nalavade
چکیده

Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing number of attacks. Tracing the source of the attacking packet is very difficult because of stateless and destination based routing infrastructure of Internet. If the attacks are detected successfully, then preventive measures for attacks can be taken. Host based and network based intrusion prevention systems are available in the market. Host based Intrusion Prevention Systems are designed to protect information systems from unauthorized access, damage or disruption. To counteract the rapidly evolving threats presented by the latest generation of worms, software and network exploits knowledge of intrusion detection and prevention is very much important. This paper provides the in depth study of methodologies and models used for intrusion-detection. Details about prevention technologies are also stated. Attacks on intrusion prevention systems and counter measure is also described. We propose our approach for intrusion detection and prevention in the networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Statistical Fraud Detection: A Review

Fraud is increasing dramatically with the expansion of modern technology and the global superhighways of communication, resulting in the loss of billions of dollars worldwide each year. Although prevention technologies are the best way of reducing fraud, fraudsters are adaptive and, given time, will usually find ways to circumvent such measures. Methodologies for the detection of fraud are esse...

متن کامل

Dynamic IDP Signature processing by fast elimination using DFA

Intrusion Detection & Prevention Systems generally aims at detecting / preventing attacks against Information systems and networks. The basic task of IDPS is to monitor network & system traffic for any malicious packets/patterns and hence to prevent any unwarranted incidents which leads the systems to insecure state. The monitoring is done by checking each packet for its validity against the si...

متن کامل

Evaluating Intrusion Detection and Prevention Systems Using Tomahawk and Wireshark

The increase in the security breach of computer systems and computer networks has led to the increase in the number of security tools that seek to protect these asserts. Among these tools are intrusion detection and prevention systems (IDPS). An IDPS is a security system that is used to detect and prevent security violations. Evaluating the effectiveness of IDPS is complicated and there has not...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Network Intrusion Forensic Analysis Using Intrusion Detection System

The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throug...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011