IMMIX-Intrusion Detection and Prevention System

被引:0
作者
Vasudeo, Sarode Harshal [1 ]
Patil, Pravin [2 ]
Kumar, R. Vinoth [3 ]
机构
[1] Ctr Dev Adv Comp, Wireless & Network Secur, Pune, Maharashtra, India
[2] PICT, Comp Engn, Pune, Maharashtra, India
[3] VelTech Univ, Dept Informat Technol, Madras, Tamil Nadu, India
来源
2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM) | 2015年
关键词
anomaly based; attacks; classification; intrusion detection; intrusion prevention; misuse based;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer security has become a major problem in our society. Specifically, computer network security is concerned with preventing the intrusion of an unauthorized person into a network of computers. An intrusion detection system (IDS) is a tool to monitor the network traffic and users activity with the aim of distinguishing between hostile and non-hostile traffic. Most of current networks implement Misuse detection or Anomaly detection techniques for Intrusion detection. By deploying misuse based IDS it cannot detect unknown intrusions and anomaly based IDS have high false positive rate for detection. To overcome this, proposed system uses combination of both network based and host based IDPS as Hybrid Intrusion Detection and Prevention System which will be helpful for detecting maximum attacks on networks.
引用
收藏
页码:96 / 101
页数:6
相关论文
共 10 条
[1]  
[Anonymous], 1997, THE ID3 ALGORITHM
[2]  
Bhuyan MH, 2014, IEEE COMMUNICATIONS, V16
[3]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[4]  
Dave Shalvi, 2013, INT J NETWORK SECURI, V5, DOI [10.5121/ijnsa.2013.5208, DOI 10.5121/IJNSA.2013.5208]
[5]  
Gómez J, 2009, LECT NOTES COMPUT SC, V5518, P515, DOI 10.1007/978-3-642-02481-8_75
[6]  
He Jialong, IMPORTANT WINDOWS FI
[7]  
Idrees Fauzia, 2013, ICTC2013
[8]  
Kumar Avishek, 2013, LINUX DIRECTORY STRU
[9]   Anomaly Detection: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
ACM COMPUTING SURVEYS, 2009, 41 (03)
[10]  
Rana Kushik K, 2014, INT J ENG DEV RES, V2