EIDPS: An Efficient Approach to Protect the Network and Intrusion Prevention

Conference proceedings article


Authors / Editors


Research Areas

No matching items found.


Publication Details

Author list: Selvaraj R, Kuthadi VM, Marwala T

Publisher: Springer Verlag (Germany)

Place: BERLIN

Publication year: 2016

Journal: Advances in Intelligent Systems and Computing (2194-5357)

Journal acronym: ADV INTELL SYST

Volume number: 434

Start page: 35

End page: 47

Number of pages: 13

ISBN: 978-81-322-2750-2

eISBN: 978-81-322-2752-6

ISSN: 2194-5357

eISSN: 2194-5365

Languages: English-Great Britain (EN-GB)


View in Web of Science | View on publisher site | View citing articles in Web of Science


Abstract

Nowadays, Network Security is growing rapidly because no user specifically wants his/her computer system to be intruded by a malicious user or an attacker. The growing usage of cloud computing provides a different type of services, which leads users to face security issues. There are different types of security issues such as hacking intrusions worms and viruses, DoS etc. Since the entire needed resources are associated with everyone and are centrally monitored by main controller in cloud computing area it creates a simplest way for intruders. In addition, an experienced or knowledgeable attacker can get to make out the system's weakness and can hack the sensible information or any resource and so, it is essential to provide protection against attack or intrusion. Additionally, to handle poor performance or low latency for the clients, filtering malicious accesses becomes the main concern of an administrator. Some of the traditional Intrusion Detection and Prevention Systems fail to overcome the abovementioned problems. As a result, this research proposes a novel approach named Enhanced Intrusion Detection Prevention System to prevent, protect and respond the various network intrusions in the internet. Our proposed system use client-server architecture, which contains main server and several clients. Clients record the doubtful actions taking place in the Internet and record the suspicious information. Then, this recorded information is forwarded to the main server for further usage. After that, the main server analyses the received data and then make decision whether to provide a security alert or not; then the received information is displayed via an interface. In addition, server verifies the data packets using IDPS and classifies the attacks using Support Vector Machine. Finally, as per the attack type Honeypot system sends irrelevant data to the attacker. The experimentally deployed proposed system results are shown in our framework which validates the authorized users and prevents the intrusions effectively rather than other frameworks or tools.


Keywords

Honeypot system, Intrusion detection prevention system, Network security, Support vector machine


Documents

No matching items found.


Last updated on 2021-07-05 at 03:59