ShodhGangotri: Repository of Indian Research in Progress >
Manav Rachna International University >
Department of Computer Science Engineering >
Please use this identifier to cite or link to this item:
|Title: ||Tracking Hybrid Intrusion Detection System in the Network|
|Keywords: ||Intrusion Detection System ( IDS), Hybrid Intrusion Detection System, Peer to Peer Network (P2P), Adaptive consistency maintenance algorithm (ACMA), Top Caching (TC) algorithm.|
|Researcher: ||A.Karim Hasina A.Razzak|
|Guide(s): ||Dr. S.S. Handa|
|Registration Date: ||25.01.2013|
|Abstract: ||An intrusion detection system (IDS) is a device for providing secure data transmission or software application that monitors networks or system activities for malicious activities or policy violations and produces reports to a Management Station. Intrusion detection and prevention systems (IDPS) primarily focused on identifying possible incidents, logging information about them, and reporting attempts.(IDS) is the major aspect of network computer security . Unlike firewall, it does not block particular data but keeps track of incoming data and determines whether any intrusion is underway or not. It also has records of previous attacks for future reference. IDS prevents the intrusion in first place itself. And also possibly notifies the user and brings system back on track.
newlineAs there is a rapid growth of the network applications, new kinds of network attacks are emerging endlessly. So, it is crucial to protect the networks from attackers, and it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. Due to this IDS technology came into existence.
newlineThere are various problems which the existing intrusion detection system models have, such as more significant network transmission load, lower detection efficiency, and limited data process ability. Data security is a huge responsibility for sensor network as there are various ways in which security can be breached, enabling hackers to access sensitive data. Also different neural methods have been proposed in recent years for the development of intrusion detection system.
newlineOur aim is to present an intrusion detection module based on P2P ( peer to peer ) overlay networks for distributed data sharing which combines the advantages of both types of Peer-to-peer networks and minimizes their disadvantages.
|Appears in Department:||Department of Computer Science Engineering|
Items in ShodhGangotri are available on open access mode, unless otherwise indicated.