We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Architecture for Real Time Monitoring and Modeling of Network Behavior for Enhanced Security

by M. Ambika, R. V. Nataraj
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 8
Year of Publication: 2013
Authors: M. Ambika, R. V. Nataraj
10.5120/10655-5421

M. Ambika, R. V. Nataraj . Architecture for Real Time Monitoring and Modeling of Network Behavior for Enhanced Security. International Journal of Computer Applications. 64, 8 ( February 2013), 21-25. DOI=10.5120/10655-5421

@article{ 10.5120/10655-5421,
author = { M. Ambika, R. V. Nataraj },
title = { Architecture for Real Time Monitoring and Modeling of Network Behavior for Enhanced Security },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 8 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number8/10655-5421/ },
doi = { 10.5120/10655-5421 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:51.454966+05:30
%A M. Ambika
%A R. V. Nataraj
%T Architecture for Real Time Monitoring and Modeling of Network Behavior for Enhanced Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 8
%P 21-25
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network security is a rapidly growing and is the major area of concern for every network. Firewalls are used as a security check point in network environment even then different types of security issues keep on emerging. In order to protect the network from illegal access, the concept of Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) is been developed. An IDS is a system where the events occurring in a network is monitored and analyzed for identifying the sign of possible incidents. These incidents may either be violations or the threats that are about to happen violating the computer security policies or standard security policies. Java programming language is made use for developing the Intrusion Detection System. JPCap package is used along with winpcap for developing the traffic monitoring system. The network packets are captured online i. e. , as they come across the interface of the network. The IDS is aimed to provide the preliminary level of detection techniques so as to secure the systems present in the networks.

References
  1. Ahmed Patel, Qais Qassim, Christopher Wills. "A survey of intrusion detection and prevention systems", Information Management & Computer Security Journal, Vol. 3, Page: 64-69, 2010.
  2. Oludele Awodele, Sunday Idowu, Omotola Anjorin, and Vincent J. Joshua, "A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS)", Babcock University, Volume 6, Page: 20-26, 2009.
  3. Mario Guimaraes, Meg Murray. "Overview of Intrusion Detection and Intrusion Prevention", Information security curriculum development Conference by ACM Page: 39-44, 2008.
  4. Muhammad Awais Shibli, Sead Muftic. "Intrusion Detection and Prevention System using Secure Mobile Agents", IEEE International Conference on Security & Cryptography, Page: 58-67, 2008.
  5. David Wagner, Paolo Soto. "Mimicry Attacks on Host Based Intrusion Detection Systems", 9th ACM Conference on Computer and Communications Security, Page: 27-35, 2002.
  6. Harley Kozushko. "Intrusion Detection: Host-Based and Network-Based Intrusion Detection Systems", Babcock University, Volume 6, Page: 20-26, 2003
  7. Lin Tan, Timothy Sherwood. "A High Throughput String Matching Architecture for Intrusion Detection and Prevention", Proceedings of the 32nd Annual International Symposium on Computer Architecture (ISCA 2005).
  8. S. Mrdovic, E. Zajko. "Secured Intrusion Detection System Infrastructure", University of Sarajevo/Faculty of Electrical Engineering, Sarajevo, Bosnia and Herzegovina, ICAT, Page: 49-57, 2005.
  9. Yeubin Bai, Hidetsune Kobayashi. "Intrusion Detection Systems: technology and Development", 17th International Conference of Advanced Information Networking and Applications, (AINA 2003).
  10. M. Laureano, C. Maziero1, E. Jamhour. Protecting "Host-Based Intrusion Detectors through Virtual Machines", The International Journal of Computer and Telecommunications Networking, Vol. 9, Page: 24-31, 2007. networks". IEEE Transactions on Mobile Computing 2010;9(July):913–26.
  11. "Host Intrusion Prevention Systems and Beyond", SANS Institute (2008).
  12. "Intrusion Detection and Prevention In-sourced or Out-sourced", SANS Institute (2008).
  13. Matt Carlson and Andrew Scharlott. "Intrusion detection and prevention systems", (2006).
  14. Sang-Jun Han and Sung-Bae Cho. "Combining Multiple Host-Based Detectors Using Decision Tree", Australian Joint Artificial Intelligence Conference, (AUSAI 2003).
  15. Ramaprabhu Janakiraman, Marcel Waldvogel, Qi Zhang. Indra: "A peer-to-peer approach to network intrusion detection and prevention", Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Firewalls Intrusion Detection System (IDS) Intrusion Prevention System (IPS) Winpcap Jpcap