Intrusion Detection by Implementing CRF's Using the Technique of Layered Approach

2012 ◽  
Vol 2 (2) ◽  
pp. 128-131
Author(s):  
Baji Yadala ◽  
◽  
Shaik Salma Begum
10.28945/3370 ◽  
2009 ◽  
Author(s):  
Oludele Awodele ◽  
Sunday Idowu ◽  
Omotola Anjorin ◽  
Vincent Joshua

Ignoring security threats can have serious consequences; therefore host machines in network must continually be monitored for intrusions since they are the final endpoint of any network. As a result, this paper presents an Intelligent Intrusion Detection and Prevention System (IIDPS), which monitors a single host system from three different layers; files analyzer, system resource and connection layers. The approach introduced, a multi - layered approach, in which each layer harnesses both aspects of existing approach, signature and anomaly approaches, to achieve a better detection and prevention capabilities. The design of IIDPS consist of three basic components; the Executive which is an agent that runs in the background, iBaseline which is a database that stores the signatures of intrusions and the iManager which is a user Interface that serves as an intermediary between the IIDPS and the user. This work serves as a foundation upon which interested researchers can further build on to achieve better detection and prevention capabilities.


Author(s):  
Aditi Nema

The detection portion of Intrusion Detection System is the most complicated. The IDS goal is to make the network more secure, and the prevention portion of the IDS must accomplish that effort. After malicious or unwanted traffic is identified, using prevention techniques can stop it. When an IDS is placed in an inline configuration, all traffic must travel through an IDS sensor. In this paper the reduced the features and perform layered architecture for identify various attack (DoS, R2L, U2R, Probe) and show accuracy using SVM with genetic approach.


Sign in / Sign up

Export Citation Format

Share Document