We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Advanced Intrusion Detection System with Prevention Capabilities

by A.b.pawar, D.n.kyatanavar, M.a.jawale
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 13
Year of Publication: 2014
Authors: A.b.pawar, D.n.kyatanavar, M.a.jawale
10.5120/18580-9853

A.b.pawar, D.n.kyatanavar, M.a.jawale . Advanced Intrusion Detection System with Prevention Capabilities. International Journal of Computer Applications. 106, 13 ( November 2014), 17-24. DOI=10.5120/18580-9853

@article{ 10.5120/18580-9853,
author = { A.b.pawar, D.n.kyatanavar, M.a.jawale },
title = { Advanced Intrusion Detection System with Prevention Capabilities },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 13 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 17-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number13/18580-9853/ },
doi = { 10.5120/18580-9853 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:39:18.641660+05:30
%A A.b.pawar
%A D.n.kyatanavar
%A M.a.jawale
%T Advanced Intrusion Detection System with Prevention Capabilities
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 13
%P 17-24
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today, with the advent of internet, everyone can do information exchange and resource sharing. Even business organization and government agencies are not behind in this move to reach users for their decision making and for business strategies. But at the same time, with ease of use and availability of various software tools, breaching and penetrating into other's network and confidential credential can be done by any individual with little knowledge expertise and hence the internet attacks are rise and are main concerns for all internet users and business organizations for internal as well as external intruders. Even, existing solutions and commercial Intrusion Detection Systems (IDSs) are developed with limited and specific intrusion attack detection capabilities without any prevention capabilities to secure vital resources of the information infrastructure. So, this paper explores the details about the implementation and experimental analysis of Advanced Intrusion Detection System (AIDS) with its prevention capabilities to provide detection of known as well as unknown intrusions in the computer system and also automatic alerts are given to the network administrator for applying prevention capabilities. Further, this system is intended to generate new intrusion signatures from unknown intrusions and store them back into signature database to speed up detection capabilities of this AIDS in next iterative computation. Data mining approach is used to handle the large amount of data captured in the Internet to improve its execution time and to give fast response to the network administrator for prevention of data resource with minimal user intervention. In experimental analysis, this proposed system gives improved and effective intrusion detection rate up to 91% in comparison with existing research IDSs Snort and PHAD with minimization in false positive rate up to 11%.

References
  1. A. B. Pawar, Dr. D. N. kyatanavar, M. A. Jawale 2013, Development of Advanced Intrusion Detection System: Review In Proc. of ICRTET 2013, Feb 2013 & In IJCA.
  2. A. B. Pawar, Dr. D. N. kyatanavar, M. A. Jawale 2013, Design of Advanced Intrusion Detection System In Proc. Series 01 of AIM 2013& CPE 2013, Elsevier.
  3. A. B. Pawar, Dr. D. N. kyatanavar, M. A. Jawale 2014 Implementation of Advanced Intrusion Detection System to improve Detection and Prevention Capabilities based on Data Mining In Proc. of ICRTET'14,Elsevier.
  4. K. Hwang, Y. Kwok, S. Song, M. Cai, Y. Chen, and Y. Chen2006 DHT-Based Security Infrastructure for Trusted Internet and Grid Computing In Int'l J. Critical Infrastructures, vol. 2, no. 4, pp. 412- 433.
  5. M. V. Mahoney and P. K. Chan 2003 An Analysis of the 1999 DARPA/ Lincoln Lab Evaluation Data for Network Anomaly Detection In Proc. Int'l Symp. Recent Advances in Intrusion Detection pp. 220-237.
  6. Muamer N. Mohammad, Norrozila Sulaiman, Osama Abdulkarim Muhsin 2011 A Novel Intrusion Detection System by using Intelligent Data Mining in Weka Environment In Science Direct, Procedia Computer Science, pp. 1237–1242.
  7. Adeeb Alhomoud, Rashid Munir,Jules Pagna Disso,Irfan Awan,A. Al-Dhelaan 2011 Performance Evaluation Study of Intrusion Detection Systems In Procedia Computer Science pp. 173–180.
  8. S. Sathya Bama, et al. 2011 Network Intrusion Detection using Clustering: A Data Mining Approach, In International Journal of Computer Applications (0975 – 8887) Volume 30– No. 4, pp. 14-17
  9. Yuanqin Wu, Liang Shi, Beizhan Wang, Panhong Wang, Yangbin Liu 2011 Research on Intrusion Detection Based on Sequential Pattern Mining Algorithms In Science Direct Energy Procedia , pp. 505 – 511.
  10. Rezk, H. Ali, M. El-Mikkawy and S. Barakat 2011 Minimize the false positive rate in a database intrusion detection system In International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 5, pp. 29-38.
  11. Xiangyang Zheng, Qian He 2011 Research on Distributed Intrusion Detection System Model, In Energy Procedia,pp. 1480-1485.
  12. Bing Liu 2010 Sentiment Analysis: A Multi-Faceted Problem, In IEEE Intelligent Systems, pp. 1-5.
  13. http://hackmageddon. com/2014/01/19/2013-cyber-attacks-statistics-summary,2013.
  14. https://www. mcafee. com/japan/products/pdf/IntruVert-NextGenerationIDSWhitePaper_en. pdf
  15. http://shodh. inflibnet. ac. in:8080/jspui/bitstream/123456789/1000/1/1. introduction. doc.
  16. http://shodh. inflibnet. ac. in/bitstream/123456789/1000/2/2. literature%20review. doc.
  17. http://qenru. blogspot. in/p/blog-page. html
Index Terms

Computer Science
Information Sciences

Keywords

Attack Data Mining Intrusion Detection Intrusion Prevention