Performance Analysis of Mail Clients on Low Cost Computer With ELGamal and RSA Using SNORT

Author(s):  
Sreerama Murthy Kattamuri ◽  
Vijayalakshmi Kakulapati ◽  
Pallam Setty S.

An intrusion detection system (IDS) focuses on determining malicious tasks by verifying network traffic and informing the network administrator for restricting the user or source or source IP address from accessing the network. SNORT is an open source intrusion detection system (IDS) and SNORT also acts as an intrusion prevention system (IPS) for monitoring and prevention of security attacks on networks. The authors applied encryption for text files by using cryptographic algorithms like Elgamal and RSA. This chapter tested the performance of mail clients in low cost, low power computer Raspberry Pi, and verified that SNORT is efficient for both algorithms. Within low cost, low power computer, they observed that as the size of the file increases, the run time is constant for compressed data; whereas in plain text, it changed significantly.

Teknika ◽  
2017 ◽  
Vol 6 (1) ◽  
pp. 19-23
Author(s):  
Ery Setiyawan Jullev Atmadji ◽  
Bekti Maryuni Susanto ◽  
Rahardian Wiratama

Keamanan jaringan menjadi hal yang penting untuk semua industri dan perusahaan untuk melindungi data dan informasi penting yang berada didalamnnya. Perlindungan keamanan dalam suatu jaringan umumnya berbasis pada keamanan transmisi data yang dibuat dan diaplikasikan untuk membantu mengamankan suatu jaringan tertentu. Untuk lebih mengoptimalkan pengambilan keputusan maka diperlukan sebuah mesin yang mampu berkolaborasi dengan database IDS maupun IPS, sehingga tipikal serangan yang sangat beragam dapat dipetakan dengan lebih optimal. Salah satu database yang mempunyai rule yang sudah ada adalah IPTABLES, hal ini dikarenakan pada IPTABLES terdapat fungsi firewall yang mampu menangani jenis serangan yang berlipat serta masif. Server yang akan digunakan adalah server dengan sistem operasi Linux. Sedangkan database serangan IDS yang digunakan adalah database KDD 99 yang sudah diakui sebagai salah satu database serangan yang sangat kompleks. Dengan pemanfaatan IPTABLES ini maka diharapkan keamanan server akan bisa dimonitor dengan lebih optimal. IPTABLES biasanya digunakan sebagai salah satu firewall yang digunakan pada server.


Author(s):  
Augustin Anggeliung ◽  
Arief Dwi Rachmadian ◽  
Vincent Vincent

The development of technology is very fast, one of them is cloud computing. Cloud computing has been used from various circles and began to be developed. There are various problems that arise in cloud computing, such as problems from data, whether the data will be safe. To ensure that the data is safe, several methods or tools can be used. In this scientific work we use the Intrusion Detection System as an aid tool needed to access the network, including whether packages can protect data in cloud computing. Although the intrusion detection system there are still some shortcomings such as only being able to read some data and the performance will decrease the data very much. To overcome this it is necessary to use several additional tools such as the Intrusion Prevention System which is a refinement of the Intrusion Detection System and using the AES algorithm


Author(s):  
Akshat Divya Akshay ◽  
Anchit Bhushan ◽  
Nihal Anand ◽  
Rishabh Khemka ◽  
Sumithra Devi K.A

The number of computers connecting to the internet is getting increased day by day, while the number of computers connected is increasing then it is obvious that the amount of network-based attacks will also increase. In this way, we use a honeypot that is a framework trap that is set to act against unapproved utilization of PCs and data frameworks. Around the globe, a huge number of individuals get to the web each day, honeypot which can likewise be called Intrusion Detection Technology is another time of security innovation that screens device to avoid malicious sports. The whole factor of this research paper is an Intrusion Detection System and Intrusion Prevention System, elements accomplished via honeypot and honeytrap methodologies. A great deal of research went into this review paper and the discoveries propose that the honeypots are drawing in light of a legitimate concern for analysts as a significant security system that can be actualized to stop or occupy the assaults the system assaults and give a chance to find out increasingly more about the source and nature of these assaults. Hence we can say that a honeypot can be utilized as an examination apparatus to accumulate increasingly more data about the expanding number of system assaults that are going on consistently.


Internet of Things (IoT) is a network spread globally and accommodates maximum things under it. All these things are connected globally using IPv6 protocol which satisfies the need of connecting maximum devices by supporting 2^128 addresses. Because of heavy-weight nature of IPv6 protocol, a compressed version of it known as IPv6 Low Power Personal Area Network (6LoWPAN) protocol is used for a resource-constrained network that communicates over low power and lossy links. In IoT, devices are resource-constrained in terms of low battery power, less processing power, less transceiver power, etc. Also these devices are directly connected to insecure internet hence it is very challenging to maintain security in IoT network. In this paper, we have discussed various attacks on 6LoWPAN and RPL network along with countermeasures to reduce the attacks. DoS attack is one of the severe attacks in IoT which has various patterns of execution. Out of various attacks we have designed Intrusion Detection System (IDS) for Denial of Service (DOS) attack detection using Contiki OS and Cooja simulator.


Sign in / Sign up

Export Citation Format

Share Document