The Approaches to Amalgamate the Anti-Network Attacks Technologies in Intrusion Detection and Prevention Systems
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: A Network Intrusion Detection Prevention System (IDPS) is a mechanism that continuously monitors the network traffic and finds out the malicious, suspicious and undesired network activities. After identifying any illegitimate activity it simply blocks it and changes the security environment as per the rules set by policy maker(s). It should be noted that this task of monitoring is accomplished in real -time mode so that the only genuine network traffic is allowed to pass through the IPS without noticeable delay. Additionally, some organizations employ many other technologies on the place of IDPSs that present the same ability as IDPSs does and also match with the competen cies of IDPSs. In this paper, we will focus on some of these matching technologies: network forensic analysis tools, anti-malware technologies (antivirus software) and firewalls and routers. Each of these technologies are now briefly explained giving the information how its use help in detecting intrusion and its avoidance stating relationship of these technologies with IDPSs. Suggestion will be added to appropriation telling how we should use these technologies along with IDPSs.
Authors and Affiliations
Aaruni Goel , Madhup Sharma , K. M. Pandey
Analysis of blood samples for counting leukemia cells using Support vector machine and nearest neighbour
Abstract: analysis of blood samples for counting leukemia cells is discussed in this paper. support vector machine and nearest neighbour concept is presented in this paper. The identification of blood disorders,...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Session Grouping
Cataloging traffic keen on precise network applications is vital for application-aware network organization and it turn into more taxing because modern applications incomprehensible their network behaviors. Whe...
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
Abstract : In this paper a pose invariant face recognition using neuro-fuzzy approach is proposed. Hereadaptive neuro fuzzy interface system (ANFIS) classifier is used as neuro-fuzzy approach for pose invariant fac...
Modified Leach in Wireless Sensor Network
Abstract: Wireless sensor network consists of large number of sensor nodes which is used to capture environmental conditions, process and transfer it to base station. These sensor nodes are sensitive to energy cons...
Mining Of Influential Users in a Blog Network
Abstract: Blogging sites are very popular in today’s world; users interact with each other and create socialrelationships between them. Data mining methods can be used to extract the blogging sites. Users can be ac...