An efficient intrusion detection system for networks with centralized routing

被引:0
作者
Andrade, Paulo F. [1 ]
da Silva, Fernando Mira [1 ]
Ribeiro, Carlos [1 ]
机构
[1] Univ Tecn Lisboa, Inst Super Tecn, P-1096 Lisbon, Portugal
来源
SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2007年
关键词
intrusion detection systems; switch-based networks; security analysis;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As Internet becomes more and more ubiquitous, security is an increasingly important topic. Furthermore, private networks are expanding and security threats from within the network have to be cautioned. For these large networks, which are generally high-speed and with several segments, Intrusion Detection System (IDS) placement usually comes down to a compromise between money invested and monitored services. One common solution in these cases, is to use more than one IDS scattered across the network, thus, raising the amount invested and administrative power to operate. Another solution is to collect data through sensors and send it to one IDS via an Ethernet hub or switch. This option normally tends to overload the hub/switch port where the IDS is connected. This paper presents a new solution, for networks with a star topology, where an IDS is coupled to the network's core router. This solution allows the IDS to monitor every different network segment attached to the router in a round-robin fashion.
引用
收藏
页码:102 / 106
页数:5
相关论文
共 50 条
  • [21] Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks
    Al Sawafi, Yahya
    Touzene, Abderezak
    Hedjam, Rachid
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (02)
  • [22] Intrusion detection and the role of the system administrator
    Sommestad, Teodor
    Hunstad, Amund
    [J]. Information Management and Computer Security, 2013, 21 (01): : 30 - 40
  • [23] Testing Automation for an Intrusion Detection System
    Straub, Jeremy
    [J]. 2017 IEEE AUTOTESTCON, 2017,
  • [24] Intrusion Detection System in UDP Protocol
    Duraiswamy, K.
    Palanivel, G.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (03): : 1 - 5
  • [25] Genetic Algorithm For Intrusion Detection System
    Karatas, Gozde
    [J]. 2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 1341 - 1344
  • [26] An efficient feature selection and classification approach for an intrusion detection system using Optimal Neural Network
    Pran, S. Gokul
    Raja, Sivakami
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (05) : 8561 - 8571
  • [27] Optimal Bayesian Network Design for Efficient Intrusion Detection
    Ruiz-Agundez, Igor
    Penya, Yoseba K.
    Garcia Bringas, Pablo
    [J]. 3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 444 - 451
  • [28] WOGRU-IDS - An intelligent intrusion detection system for IoT assisted Wireless Sensor Networks
    Ramana, Kadiyala
    Revathi, A.
    Gayathri, A.
    Jhaveri, Rutvij H.
    Narayana, C. V. Lakshmi
    Kumar, B. Naveen
    [J]. COMPUTER COMMUNICATIONS, 2022, 196 : 195 - 206
  • [29] Intrusion Detection System Based on Multi-Layer Perceptron Neural Networks and Decision Tree
    Esmaily, Jamal
    Moradinezhad, Reza
    Ghasemi, Jamal
    [J]. 2015 7TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2015,
  • [30] Applying Intrusion Detection Systems to Wireless Sensor Networks
    Roman, Rodrigo
    Zhou, Jianying
    Lopez, Javier
    [J]. 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 640 - +