Requirement Based Intrusion Detection in Addition to Prevention Via Advanced Metering Infrastructure

Abstract

An intrusion detection system (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases, the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion. The proposed protocol called Password Guessing Resistant Protocol (PGRP), helps in preventing such attacks and provides a pleasant login experience for legitimate users. PGRP limits the number of login attempts for unknown users. In additional we propose an attack detector for cloud spoofing that utilizes MAC (Media access Control) and RSS (Received Signal strength) analysis. Next, we describe how we integrated our attack detector into a real-time indoor localization system, which is also capable of localizing the positions of the attackers.

Authors and Affiliations

Jonisha S/Ap

Keywords

Related Articles

Microbiological Profile and Quality Assessment of Unbranded Groundnut Oil Marketed at a Major City in Nigeria, Sub-Sahara Africa.

This work was conducted to assess the microbial profile and quality attributes of unbranded groundnut oil sold at Keffi. A total of 25 samples of unbranded groundnut oil were collected from different locations and subjec...

Macroeconomic stability in the DRC: highlighting the role of exchange rate and economic growth

This study is part of a macroeconomic approach and seeks to identify the role of the rate of economic growth and the exchange rate in controlling the macroeconomic framework. The approaches adopted in this paper are part...

Existence of positive solutions for fractional differential involving the discrete delta−nabla fractional boundary value problem with non-homogeneous boundary conditions

In this paper, we consider a nonlinear fractional boundary value problem with non-homogeneous boundary conditions: ( ( ( ))) ( ) ( ( )) ( ) ( )  ( )  ( ( ))       = − = + − =    + + − − + − − =  − = + − − −...

Multi products storage using randomness

The following Project shows the benefits of a research established into a multi-products warehouse belongs to an automotive industry supplier. The main goal was applied a tool recognizing the rules for distribution and m...

A study on financial aspect of supply chain management

The more common approaches used in the SCM consider only the physical logistic operations and ignore the financial aspects of the supply chain. The main objective to incorporate financial aspects in supply chain manageme...

Download PDF file
  • EP ID EP289049
  • DOI -
  • Views 150
  • Downloads 0

How To Cite

Jonisha S/Ap (2018). Requirement Based Intrusion Detection in Addition to Prevention Via Advanced Metering Infrastructure. Invention Journal of Research Technology in Engineering & Management, 2(4), 56-58. https://www.europub.co.uk/articles/-A-289049