Creating a Complete Model of an Intrusion Detection System effective on the LAN

Abstract

 the Intrusion Detection Systems (IDS) are now an essential component in the structure of network security. The logs of connections and network activity, with a large amount of information, can be used to detect intrusions. Despite the development of new technologies of information and communication following the advent of the Internet and networks, computer security has become a major challenge, and works in this research are becoming more numerous. Various tools and mechanisms are developed to ensure a level of security to meet the demands of modern life. Among the systems, intrusion detection for identifying abnormal behavior or suspicious activities to undermine the legitimate operation of the system. The objective of this paper is the design and implementation of a comprehensive architecture of IDS in a network.

Authors and Affiliations

Yousef FARHAOUI, Ahmed ASIMI

Keywords

Related Articles

Numerical Evaluation of the Effect of Gradient on Reflection Coefficient of Continuously Graded Layer

This paper presents a numerical model, based on transfer matrix method, for modeling the propagation of surface acoustic waves at the interface formed by the coupling liquid and a continuously inhomogeneous thin layer on...

A Mobile Device Software to Improve Construction Sites Communications "MoSIC"

Effective communication among project participants in construction sites is a real dilemma for construction projects productivity. To improve the efficiency of participants in construction projects and have a speedy deli...

Implementation of Locally Weighted Projection Regression Network for Concurrency Control In Computer Aided Design 

This paper presents implementation of locally weighted projection regression (LWPR) network method for concurrency control while developing dial of a fork using Autodesk inventor 2008. The LWPR learns the objects and the...

A New 30 GHz AMC/PRS RFID Reader Antenna with Circular Polarization

The work on this guideline focus on the development and the design of a circularly polarized metallic EBG antenna fed by two microstrip lines. In order to achieve that purpose, a list of indicative specifications has bee...

Fruit Fly Optimization Algorithm for Network-Aware Web Service Composition in the Cloud

Service Oriented Computing (SOC) provides a framework for the realization of loosely coupled service oriented applications. Web services are central to the concept of SOC. Currently, research into how web services can be...

Download PDF file
  • EP ID EP145657
  • DOI -
  • Views 91
  • Downloads 0

How To Cite

Yousef FARHAOUI, Ahmed ASIMI (2012).  Creating a Complete Model of an Intrusion Detection System effective on the LAN. International Journal of Advanced Computer Science & Applications, 3(5), 147-150. https://www.europub.co.uk/articles/-A-145657