Intelligence Intrusion Detection Prevention Systems using Object Oriented Analysis method
Journal Title: Indian Journal of Computer Science and Engineering - Year 2010, Vol 1, Issue 4
Abstract
This paper is deliberate to provide a model for “Intelligence Intrusion Detection Prevention Systems using Object Oriented Analysis method ” , It describes the state’s overall requirements regarding the acquisition and implementation of intrusion prevention and detection systems with intelligence (IIPS/IIDS). This is designed to provide a deeper understanding of intrusion prevention and detection principles with intelligence may be responsible for acquiring, implementing or monitoring such systems in understanding the technology and strategies available. With the need for evolution, if not revolution, of current network architectures and the Internet, autonomous and spontaneous management will be a key feature of future networks and information systems. In this context, security is an essential property. It must be thought at the early stage of conception of these systems and designed to be also autonomous and spontaneous. Future networks and systems must be able to automatically configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing environment. Those networks and systems should interoperate securely when their respective security policies are heterogeneous and possibly conflicting. They must be able to autonomously evaluate the impact of an intrusion in order to spontaneously select the appropriate and relevant response when a given intrusion is detected. Autonomous and spontaneous security is a major requirement of future networks and systems. Of course, it is crucial to address this issue in different wireless and mobile technologies available today such as RFID,Wifi, Wimax, 3G, etc. Other technologies such as ad hoc and sensor networks, which introduce new type of services, also share similar requirements for an autonomous and spontaneous management of security.
Authors and Affiliations
S. MURUGAN , DR. K. KUPPUSAMY
AN ENERGY EFFICIENT EVENT DETECTION CLASSIFIER IN WIRELESS SENSOR NETWORK USING SUPPORT VECTOR MACHINE
Wireless sensor network (WSN) comprises of nodes that are spatially distributed to monitor the environments and detect the events accordingly. Correlated Data Gathering (CDG) in wireless sensor network used Adaptive and...
NOVEL SCHEME FOR THE REMOVAL OF BLOTCHES, BLACK BAND NOISE, STREAKS AND IMPULSE NOISE IN GRAY SCALE IMAGES
A Threshold based fixed 3x3 Non linear filter for the removal of image artifact such as blotches, black band noise, streaks and impulse is proposed. The algorithm detects the corrupted pixel, if the absolute difference b...
ANALYSIS ON PERFORMANCE WITH COMBINATION OF SCHEDULING AND REPLICATION IN DATA GRIDS
Data grid is the storage component of a grid environment. Amount of data transferred among nodes can be reduced by submitting the jobs to the nodes that having maximum requested files by scheduling and reducing the acces...
MULTIPATH VIRTUAL QUEUE MANAGEMENT SYSTEM FOR EFFECTIVE PACKET SCHEDULING IN MPLS NETWORKS
With the rapid development of communication and networking technologies VOIP has become an alternate to traditional telephony. These applications prefer timeliness in packet delivery. To perform load balancing, link util...
A REVIEW PAPER ON MULTIDIMENTIONAL DATA STRUCTURES
Multimedia Data Structures is needful for storing multimedia data such as Text, Images, Audio, Video, and Graphical Objects. The growth of digital content gave rise to the revolution of very large multimedia Data Structu...