Implementation of Karp-Rabin string matching algorithm in reconfigurable hardware for network intrusion prevention system

2006 ◽  
Author(s):  
Jakub Botwicz ◽  
Piotr Buciak ◽  
Piotr Sapiecha
2021 ◽  
Vol 5 (1) ◽  
pp. 60-69
Author(s):  
Farid Wahyudi ◽  
◽  
Listanto Tri Utomo ◽  

Security is very main in computer networks, where many devices are connected to each other to interact and exchange data without limits. Network security is also a very important issue to prioritize, one of which is to use an intrusion prevention system. At PDTI UNIRA there are often network security problems, one of which is that during the test season, the server experiences many intrusion problems. The purpose of this research is to develop a social science system based on the analysis at PDTI of Raden Rahmat Islamic University Malang. This research method uses a computer security development approach, namely the Intrusion Prevention System (IPS), by combining firewall engineering methods and Intrusion-Detection System (IDS). The result of this research is a technology that can be used to prevent attacks that will enter the local network checking and recording all data packets and recognizing sensor packets, when the attack has been identified, IPS will deny access (block) and record (log) all data packets. identified. So IPS acts as a firewall that will allow and block combined with IDS that can detect packets in detail. With a network security system, the Unira PDTI server is safer and can avoid intrusion.


2021 ◽  
Vol 14 (2) ◽  
pp. 67
Author(s):  
Guanlin Chen ◽  
Kunlong Zhou ◽  
Yubo Peng ◽  
Liang Zhou ◽  
Yong Zhang

Author(s):  
Gabriel Marvel Vaz ◽  
Tiago Antonio Rizzetti ◽  
Walter Priesnitz Filho

Neste artigo é apresentado um estudo de caso sobre a implantação de um ambiente de prevenção de intrusões em uma rede de computadores de uma instituição de ensino. A arquitetura adotada baseou-se em utilizar um Network Intrusion Prevention System (NIPS) em conjunto com Host Intrusion Prevention System (HIPS), a fim de detectar e bloquear ataques destinados à rede. O software Suricata foi configurado inline, filtrando o tráfego da rede. Para visualização dos logs, a pilha Elasticsearch, Logstash e Kibana (ELK) foi configurada em conjunto com a ferramenta Synesis, permitindo a visualização dos dados através de uma interface Web. Com isso, foi possível detectar e bloquear ameaças, dentre elas varreduras, comunicações originadas por hosts maliciosos entre outras. A partir disso, foram tomadas ações como a adição de novas regras de firewall, criação de uma blacklist, dentre outras medidas que contribuíram para elevar o nível de segurança da rede.


2011 ◽  
Vol 14 (1) ◽  
pp. 11-18 ◽  
Author(s):  
Deris Stiawan ◽  
Abdul Hanan Abdullah ◽  
Mohd. Yazid Idris

Sign in / Sign up

Export Citation Format

Share Document