NIDS: A network based approach to intrusion detection and prevention

被引:7
作者
Ahmed, Martuza [1 ]
Pal, Rima [1 ]
Hossain, Md. Mojammel [1 ]
Bikas, Md. Abu Naser [1 ]
Hasan, Md. Khalad [1 ]
机构
[1] Shahjalal Univ Sci & Technol, Dept Comp Sci & Engn, Sylhet, Bangladesh
来源
IACSIT-SC 2009: INTERNATIONAL ASSOCIATION OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY - SPRING CONFERENCE | 2009年
关键词
Intrusion Detection System; Intrusion Prevention; Trust Issue; Packet Behavior; Discard Packet;
D O I
10.1109/IACSIT-SC.2009.96
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Computer networks have added new dimensions to the global communication. But intrusions and misuses have always threatened the secured data communication over networks. Consequently, network security has come into issue. Now-a-days intrusion detection systems play an important role in security infrastructures. Intrusions typically start with intruders infiltrating a network through a vulnerable host and after that approaching for further malicious attacks. The techniques used for intrusion detection have their particular limitations. Any of the Intrusion Detection Systems proposed so far is not completely flawless. The host based systems as well as the network based systems have their own limitations. So, the quest for betterment continues. In this progression, here we present NIDS: a complete intrusion detection system which reduces some significant problems contained by the previous systems such as trust issues and message spreading problems. In the proposed IDS we don't need to install the system for every host. That reduces the system overhead to a reasonable extent. This system generates steady responses against intrusions and stops the intruder to proceed for further attacks.
引用
收藏
页码:141 / 144
页数:4
相关论文
共 10 条
[1]  
ALBAG H, NETWORK AGENT BASED
[2]  
Axelsson S, 1998, 9817 DEP COMP ENG
[3]  
BALASUBRAMANIYA.JS, 1998, 9805 PURD U
[4]  
CHEUNG S, 1999, CSE992 UC DAV COMP S
[5]  
CROSBIE M, 1996, 95022 PURD U DEP COM
[6]   Intelligent agents for intrusion detection [J].
Helmer, GG ;
Wong, JSK ;
Honavar, V ;
Miller, L .
1998 IEEE INFORMATION TECHNOLOGY CONFERENCE, PROCEEDINGS, 1998, :121-124
[7]   NADIR: An automated system for detecting network intrusion and misuse [J].
Hochberg, Judith ;
Jackson, Kathleen ;
Stallings, Cathy ;
McClary, J.F. ;
DuBois, David ;
Ford, Josephine .
Computers and Security, 1993, 12 (03) :235-248
[8]  
JANAKIRAMAN R, INDRA PEER TO PEER A
[9]  
Porras P. A., 1997, Proceedings of the 20th national information systems security conference, P353
[10]  
WHITE GA, 1994, DIVERSITY, V10, P20