2015
DOI: 10.1007/978-3-319-11933-5_44
|View full text |Cite
|
Sign up to set email alerts
|

Real Time Intrusion Detection and Prevention System

Abstract: Abstract. Major challenge for organizations in today's era is to meet the security needs. Techniques for logging data, detecting intrusions, preventing intrusions have been evolving for years. This paper presents a solution to combine logging, and network based intrusion detection and prevention system. The system has been developed considering the Software Engineering framework of requirements analysis, design, implementation, and testing. For IPS open source tool snort is configured in inline mode, so that s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
29
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 63 publications
(30 citation statements)
references
References 5 publications
0
29
0
1
Order By: Relevance
“…This accessibility provides convenience to the users, but simultaneously makes users vulnerable to malicious attacks. Many security countermeasures have been introduced, such as firewalls, intrusion detection systems (IDSs), and intrusion prevention systems (IPSs) [1,2]. However, these systems are still vulnerable to evolving malicious attacks, such as zero-day attacks that can target publicly known but unpatched vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%
“…This accessibility provides convenience to the users, but simultaneously makes users vulnerable to malicious attacks. Many security countermeasures have been introduced, such as firewalls, intrusion detection systems (IDSs), and intrusion prevention systems (IPSs) [1,2]. However, these systems are still vulnerable to evolving malicious attacks, such as zero-day attacks that can target publicly known but unpatched vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%
“…They are also used to detect and react to the unauthorised access to network systems, [4,12]. There are three modes of NIDPS: analysis mode (sniffer mode); detection mode (passive mode); and prevention mode (inline mode).…”
Section: Network Intrusion Detection and Prevention System (Nidps)mentioning
confidence: 99%
“…Output modules (plugins) are capable of performing multiple operations depending on the results generated by the logging and alerting system. In general, output modules control the form of outcome produced by the logging and alerting system [7,8].Network intrusion prevention systems (NIDPSs) are active, inline devices in a network that can drop, block or reject packets and or stop malicious connections before these reach the targeted system [4,12]. NIDPSs are further classified into software and hardware based.…”
Section: Network Intrusion Detection and Prevention System (Nidps)mentioning
confidence: 99%
See 1 more Smart Citation
“…We can understand the working of these systems by looking at deductive databases [23]. Real time IDS have found more interest of researchers in the recent past [24].…”
Section: Introductionmentioning
confidence: 99%