Exception Agent Detection System for IP Spoofing Over Online Environments
نویسندگان
چکیده
Over the recent years, IP and email spoofing gained much importance for security concerns due to the current changes in manipulating the system performance in different online environments. Intrusion Detection System (IDS) has been used to secure these environments for sharing their data over network and host based IDS approaches. However, the rapid growth of intrusion events over Internet and local area network become responsible for the distribution of different threats and vulnerabilities in the computing systems. The current signature detection approach used by IDS, detects unclear actions based on analyzing and describing the action patterns such as time, text, password etc and has been faced difficulties in updating information, detect unknown novel attacks, maintenance of an IDS which is necessarily connected with analyzing and patching of security holes, and the lack of information on user privileges and attack signature structure. Thus, this paper proposes an EADS (Exception agent detection system) for securing the header information carried by IP over online environments. The study mainly concerns with the deployment of new technique for detecting and eliminating the unknown threats attacks during the data sharing over online environments. Keywords-component; IP spoofing; Intrusion detection system; Exception agent system; Local area network
منابع مشابه
PAID: A Probabilistic Agent-Based Intrusion Detection system
In this paper we describe architecture and implementation of a Probabilistic AgentBased Intrusion Detection (PAID) system. The PAID system has a cooperative agent architecture. Autonomous agents can perform specific intrusion detection tasks (e.g., identify IP spoofing attacks) and also collaborate with other agents. The main contributions of our work are the following: Our model allows agents ...
متن کاملTowards a new approach for intrusion detection with intelligent agents
In this paper, we focus on one critical issue in security management that is intrusion detection. Intrusion detection requirements and concepts are reviewed. Some existing systems are described. Their advantages and limitations are illustrated. Drawbacks of existing intrusion detection systems involve the necessity of designing a new generation of self-adaptive systems. In fact, mainly, self-co...
متن کاملIntrusion Detection in MANET using Neural Networks and ZSBT
Mobile ad-hoc network is a collection of mobile nodes that organize themselves into a network without any predefined infrastructure. The characteristics of MANET are dynamic topology; bandwidth and energy constrained and limited physical security. Due to the dynamic nature of the network, these networks can be easily vulnerable to attacks. Many type of attacks can threat the MANET and the class...
متن کاملFHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks
DDoS attacks represent a significant threat for companies, affecting them on a regular basis, as reported in the 2013 Information Security Breaches Survey. The most common target is web services, the downtime of which could lead to significant monetary costs and loss of reputation. IP Spoofing is often used in DDoS attacks not only to protect the identity of offending bots but also to overcome ...
متن کاملEfficient Defense System for Ip Spoofing in Networks
In this age of gigabit Ethernet and broadband internet, network security has been the top priority for most of the researchers. Technology advancements have advantages as well as disadvantages. Most of the communication of present world, the e-world, takes place online, through the internet. Thus the context of network intrusions and attacks to hack into servers also came into existence. A tech...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/0911.0501 شماره
صفحات -
تاریخ انتشار 2009