Open Access Open Access  Restricted Access Subscription or Fee Access

Improved Network Intrusion Detection and Prevention

A Dhivyabharathi, D Kalaiselvi

Abstract


In this stage of gigabit Ethernet and broadband internet, network security has been the top priority for most of the researchers. Technology advancements have advantages as well as disadvantages. Most of the communication of present world, the e-world, takes place online, through the internet. Thus, the framework of network invasions and attacks to hack into servers also came into existence. Internet security is a fashionable and fast-moving field; the attacks that are catching the headlines can change significantly from one year to the next. Regardless of whether they’re directly applicable to the work you do, network-based attacks are so high-profile that they are likely to have some impact, even if you only use hacker stories to get your client to allocate increased budgets to counter the more serious threats.

Full Text:

PDF

References


Y. Zhang, G. Chen, W. Weng, Z. Wang. An overview of intrusion prevention systems, IEEE ICCSNA. 2010; 3(12): 147–50p.

U.A. Sandhu, S. Haider, S. Naseer, O.U. Ateeb. A survey of intrusion detection & prevention techniques, International Conference on Information Communication and Management IPCSIT. IACSIT Press, Singapore; 2011.

K. Scarfone, P. Mell. Guide to Intrusion Detection and Prevention Systems (IDPS). Recommendations of the National Institute of Standards and Technology: NIST Special Publication, February 2007.

S. Alsunbul, P. Le, J. Tan. A defense security approach for infrastructures against hacking, Trust, Security and Privacy in Computing and Communications (TrustCom), In: 2013 12th IEEE International Conference. 2013, 1600–6p.

S. McClure, J. Scambray, G. Kurtz. Hacking Exposed: Network Security Secrets and Solutions. 7th Edn., McGraw-Hill, Inc.; 2012.

U. Bashir, M. Chachoo. Intrusion detection and prevention system: challenges & opportunities, Computing for Sustainable Global Development (INDIACom), In: 2014 International Conference. 2014; 806–9p.

N. Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, C. Charnsripinyo. A practical network-based intrusion detection and prevention system," trust, security and privacy in computing and communications (TrustCom), In: 2012 IEEE 11th International Conference. 2012; 209–14p.

D. Mudzingwa, R. Agrawal. A study of methodologies used in intrusion detection and prevention systems (IDPS), Southeastcon, In: 2012 Proceedings of IEEE. 2012; 1–6p.




DOI: https://doi.org/10.37628/ijowns.v3i1.223

Refbacks

  • There are currently no refbacks.