CFP last date
20 December 2024
Reseach Article

Analysis of Proposed Intrusion Detection System

by Kiran Dhangar, Deepak Kulhare, Arif Khan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 23
Year of Publication: 2013
Authors: Kiran Dhangar, Deepak Kulhare, Arif Khan
10.5120/11281-6273

Kiran Dhangar, Deepak Kulhare, Arif Khan . Analysis of Proposed Intrusion Detection System. International Journal of Computer Applications. 65, 23 ( March 2013), 46-50. DOI=10.5120/11281-6273

@article{ 10.5120/11281-6273,
author = { Kiran Dhangar, Deepak Kulhare, Arif Khan },
title = { Analysis of Proposed Intrusion Detection System },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 23 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 46-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number23/11281-6273/ },
doi = { 10.5120/11281-6273 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:20:43.035267+05:30
%A Kiran Dhangar
%A Deepak Kulhare
%A Arif Khan
%T Analysis of Proposed Intrusion Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 23
%P 46-50
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper titled “Proposed Intrusion Detection System” is an intrusion detection system (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Here we are concentrating and analyzing overall performance as well as security of the proposed IDS. Moreover the proposed IDS approve the effectiveness of the proposed method, and presented results shows advantages of host based as well as network based security. The proposed model of hybrid IDSs offers several advantages over alternative systems. First of all it provided higher security, it supported high availability and scalability, and most important thing it produced good results in terms of normal and abnormal behaviors of captured packet. The proposed model includes integration of individual components to produced batter results.

References
  1. Jeevaa Katiravan, C. Chellappan and J. Gincy Rejula Detecting the Source of TCP SYN Flood Attack using IP Trace Back European Journal of Scientific Research ISSN 1450-216X Vol.71 No.1 (2012), pp. 78-84
  2. V. Jyothsna, V. V. Rama Prasad and K. Munivara Prasad “A Review of Anomaly based Intrusion Detection Systems” International Journal of Computer Applications (0975 – 8887) Volume 28– No.7, August 2011
  3. Asmaa Shaker Ashoor and Prof. Sharad Gore “Importance of Intrusion Detection System (IDS)” International Journal of Scientific & Engineering Research, Volume 2, Issue 1, January-2011 ISSN 2229-5518
  4. Firkhan Ali Bin Hamid Ali and Yee Yong Len “Development of Host Based Intrusion Detection System for Log Files” IEEE symposium on business, engineering and industrial application(ISBEIA) langkawi, malaysia 2011
  5. Chung-Ming Ou and C.R. Ou “Immunity-inspired Host-based Intrusion Detection Systems” 2011 Fifth IEEE International Conference on Genetic and Evolutionary Computing.
  6. Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi and Sukumar Nandi “A Host Based DES Approach for Detecting ARP Spoofing” IEEE Conferences 2011
  7. Bin Zeng, Lu Yao, ZhiChen Chen “A Network Intrusion Detection System with the Snooping Agents” IEEE International Conference on Computer Application and System Modeling (ICCASM 2010) 2010.
  8. LIN Ying, ZHANG Yan and OU Yang-Jia “ The Design and Implementation of Host-based Intrusion Detection System” Third IEEE International Symposium on Intelligent Information Technology and Security Informatics 2010
  9. Anuradha and Anita Singhrova A Host Based Intrusion Detection System for DDoS Attack in WLAN IEEE International Conference on Computer & Communication Technology (ICCCT)-2011
  10. Chundong Wang, Quancai Deng, Qing Chang,Hua Zhang and Huaibin Wang “ A New Intrusion Detection System Based on Protocol Acknowledgement” IEEE 2010
  11. Jin-Tae Oh , Sang-Kil Park, Jong-Soo Jang and Yong-Hee Jeon “Detection of DDoS and IDS Evasion Attacks in a High-Speed Networks Environment” published in IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.6, June 2007
  12. Vera Marinova-Boncheva “A Short Survey of Intrusion Detection Systems” 2007
  13. Moad Alhamaty , Ali Yazdian and Fathi Al-qadasi “Intrusion Detection System Based On The Integrity of TCP Packet” published in World Academy of Science, Engineering and Technology 11 2007
  14. T. S. Sobh “Wired and wireless intrusion detection system Classifications, good characteristics and state-of-the-art”, Computer Standards & Interfaces 28, pp. 670-694, Science Direct, 2006.
  15. A. Lakhina, M. Crovella, & C. Diot, Mining Anomalies Using Traffic Feature Distributions. In proce. SIGCOM, Philadelphia,PA. 2005
  16. C. Lui, T. Fu Chung, & T. Ch eung. Agent-based Network Intrusion System Using Data Mining Appr roaches. In Proceedings of the 3rd IEEE International Conference on Information Technology and Applications, Vol.1, pp131-136. 2005.
  17. Moad Alhamaty , Ali Yazdian and Fathi Al-qadasi “Intrusion Detection System Based On The Integrity of TCP Packet” published in World Academy of Science, Engineering and Technology 11 2005.
  18. Douglas J. Brown, Bill Suckow, and Tianqiu Wang “A Survey of Intrusion Detection Systems” 2004
  19. Tatsuya Baba and Shigeyuki Matsuda “A Proposal of Protocol and Policy-Based Intrusion Detection System” published in Systemic, Cybernetics and Informatics volume 2 - Number 3 2004
  20. Douglas J. Brown, Bill Suckow, and Tianqiu Wang “A Survey of Intrusion Detection Systems” 2004
  21. Harley Kozushko, “Intrusion Detection: Host-Based and Network-Based Intrusion Detection Systems”, on September 11, 2003.
  22. SANS Institute Staff, Intrusion Detection and Vulnerability Testing Tools: What Works? 101 Security Solutions E-Alert Newsletters. 2001.
  23. Paul Innella Tetrad, “The Evolution of Intrusion Detection Systems”, Digital Integrity,LLC on November 16, 2001.
  24. N o r t h c u t t, S. Network Intrusion Detection: An Analyst’s Handbook. New Riders, Indianapolis, 1999.
  25. B a c e, R. An Introduction to Intrusion Detection and Assessment: For System and Network Security Management, ICSA White Paper, 1998.
  26. P u k e t z a, N., M. C h u n g, R. O l s s o n, B. M u k h e r j e e. A Software Platform for Testing Intrusion Detection Systems. – IEEE Software, September/October, 1997.
  27. Heberlein, L. etal. "A Network Security Monitor." Proceedings of the IEEE Computer Society Symposium, Research in Security and Privacy, May 1990, pp. 296-303.
  28. D. E. Denning, "An intrusion-detection model." IEEE Transactions on Software Engineering, Vol. SE-13(No. 2):222-232, Feb. 1987.
  29. Anderson, James P., “Computer Security Threat Monitoring and Surveillance”,Fort Washington, Pa., 1980.
  30. http://www.whitehelm.com/intru-det.html
  31. http://csrc.nist.gov/publications/nistpubs/800-31/sp800-31.pdf
Index Terms

Computer Science
Information Sciences

Keywords

IDS Protocols Network Security TCP Attacks