We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Generic Network Intrusion Prevention System

Published on March 2012 by Kamini Nalavade, B.B.Meshram
International Conference in Computational Intelligence
Foundation of Computer Science USA
ICCIA - Number 2
March 2012
Authors: Kamini Nalavade, B.B.Meshram
282db9f4-16da-42fb-8d3f-bb860a5d7225

Kamini Nalavade, B.B.Meshram . Generic Network Intrusion Prevention System. International Conference in Computational Intelligence. ICCIA, 2 (March 2012), 31-35.

@article{
author = { Kamini Nalavade, B.B.Meshram },
title = { Generic Network Intrusion Prevention System },
journal = { International Conference in Computational Intelligence },
issue_date = { March 2012 },
volume = { ICCIA },
number = { 2 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 31-35 },
numpages = 5,
url = { /proceedings/iccia/number2/5102-1014/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference in Computational Intelligence
%A Kamini Nalavade
%A B.B.Meshram
%T Generic Network Intrusion Prevention System
%J International Conference in Computational Intelligence
%@ 0975-8887
%V ICCIA
%N 2
%P 31-35
%D 2012
%I International Journal of Computer Applications
Abstract

Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing number of attacks. Due to vulnerabilities in the network system, protecting network from malicious activities is prime concern today. Tracing the source of the attacking packet is very difficult because of stateless and destination based routing infrastructure of Internet. If the attacks are detected successfully, then preventive measures for attacks can be taken. Intrusion prevention systems are designed based on the assumption that the behaviour of an intruder is different from a normal user. This paper describes the information sources for intrusion-detection. Combined features of network based intrusion systems and statistical data correlation techniques counteract the rapidly evolving threats presented by the latest generation of worms, software and network exploits. We propose an intrusion prevention model incorporating features of intrusion detection, prevention and data mining with data correlation.

References
  1. William Stallings, Cryptography and Network Security, Fourth Edition, Pearson Education.
  2. Rebecca Bacer, Peter Mell, “NIST special publication on Intrusion Detection Systems”
  3. Moses Garuba, Chunmei Liu, and Duane Fraites. “Intrusion Techniques: Comparative Study of Network Intrusion Detection Systems”. Fifth International Conference on Information Technology: New Generations. 978-0-7695-3099-4/08 $25.00 © 2008 IEEE.Department of Systems and Computer Science, Howard University
  4. Herve Debar, “An Introduction to Intrusion Detection Systems”, IBM Research, Internet http://citeseerx.ist.psu.edu online digital library
  5. http://CERT.org . Security research and
  6. He Xiao Dong, “Automated Intrusion Prevention Mechanism in Enhancing Network Security”. Faculty of Computer Science, University of Malay, Kuala Lumpur, March 2008.
  7. B. Meshram and Alok K. Kumar , “ HyIDS: Hybrid Intrusion Detection System”, Proceedings of National Conference on Research & Practices in Current Areas of IT, March26-27, 2004, Department of Computer Science & Engineering, Sant Harchand Sing Longowal Central Institute of Engineering & Technology, Longowal, Dist Sangar( Punjab)-148106
  8. B.B. Meshram, P.B. Ambhore , V.B. Waghmare, “Network Design Security and Management”, International Conference On Emerging Technologies and Applications In Emerging Technology and Sciences , 13-14 January 2008 , Computer Science Department, Saurashtra University, Rajkot, Gujarat(India).and Management. Ramana Rao Kompella, Sumeet Singh, George Varghese, “On Scalable Attack Detection in the Network”. IEEE /ACM Transactions on Networking, Vol. 15, No. 1, February 2007, Student Member, IEEE and Member IEEE.
  9. C. Kruegel, F. Valeur, and G. Vigna. Intrusion Detection and Correlation: Challenges and Solutions, volume 14 of Advances in Information Security. Springer, New York, USA, 2005.
  10. Y. Frank Jou, Fengmin Gong, Chandru Sargor, Shyhtsun FelixWu, and W. Rance Cleaveland. Architecture design of a scalable intrusion detection system for the emerging network infrastructure. Technical Report CDRL A005, MCNC Information Technologies Division, Research Triangle Park, N.C. 27709, April 1997.
  11. Thomas H. Ptacek and Timothy N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6, January 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Attacks Intrusion Prevention