Improved Transmission of Data and Information in Intrusion Detection Environments Using the CBEDE Methodology

Author(s):  
Reinaldo Padilha França ◽  
Yuzo Iano ◽  
Ana Carolina Borges Monteiro ◽  
Rangel Arthur

To anticipate threats, the Intrusion Detection System (IDS) enables the collection and use of information from various types of attacks to defend an entire network infrastructure. Therefore, this chapter develops a method of data transmission based on discrete event concepts, due to the fact that in this digitally globalized world, networks deal with a huge set of data all the time. Data refers to facts, events, actions, activities, and transactions which have been and can be recorded, i.e., the raw material from which information is produced, nurturing the infrastructure and components that enable modern computing. This methodology was named CBEDE and experiments were matched in the MATLAB software, where the memory consumption was evaluated, presenting great potential to intermediate users and computer systems. Results showed better computational performance related to memory utilization related to the compression of the information, showing an improvement reaching up to 114.39%.

Author(s):  
Reinaldo Padilha França ◽  
Yuzo Iano ◽  
Ana Carolina Borges Monteiro ◽  
Rangel Arthur

Smart telecoms will deliver lasting improvements to business productivity and enduring consumer benefits that raise the quality of life by enabling telecommuting, telemedicine, entertainment, access to e-government, and a wealth of other online services. And we'll need next-generation digital platforms on which telecom providers can create and deliver all kinds of services. Therefore, this chapter develops a method of data transmission based on discrete event concepts. This methodology was named CBEDE. Using the MATLAB software, the memory consumption of the proposed methodology was evaluated, presenting the great potential to intermediate users and computer systems, ensuring speed, low memory consumption, and reliability. With the differential of this research, the use of discrete events applied in the physical layer of a transmission medium, the bit itself, being this to low-level of abstraction, the results show better computational performance related to memory utilization, showing an improvement of up to 79.89%.


Author(s):  
Reinaldo Padilha França ◽  
Yuzo Iano ◽  
Ana Carolina Borges Monteiro ◽  
Rangel Arthur

Most of the decisions taken in and around the world are based on data and information. Therefore, the chapter aims to develop a method of data transmission based on discrete event concepts, being such methodology named CBEDE, and using the MATLAB software, where the memory consumption of the proposal was evaluated, presenting great potential to intermediate users and computer systems, within an environment and scenario with cyber-physical systems ensuring more speed, transmission fluency, in the same way as low memory consumption, resulting in reliability. With the differential of this research, the results show better computational performance related to memory utilization with respect to the compression of the information, showing an improvement reaching 95.86%.


Author(s):  
Reinaldo Padilha França ◽  
Yuzo Iano ◽  
Ana Carolina Borges Monteiro ◽  
Rangel Arthur

Sharing, transmitting, and storing data has been one of the great needs of today. In the last years, concepts and developed methodologies of cloud computing systems have been improved. This concept created in the 1960s today is present in daily life from ordinary users to even large companies. The present study aims to develop a method of data transmission based on discrete event concepts. This methodology was named CBEDE (by the acronym). The experiments were matched in the MATLAB software simulation environment, where the memory consumption of the proposed methodology was evaluated. Therefore, the CBEDE methodology presents great potential to intermediate users and computer systems, ensuring speed, low memory consumption, and reliability. Being the differential of this research, the use of discrete events applied in the physical layer of a transmission medium, the bit itself, being this to low-level of abstraction, the results show better computational performance related to memory utilization related to the compression of the information, showing an improvement reaching up to 69.93%


Author(s):  
Reinaldo Padilha França ◽  
Yuzo Iano ◽  
Ana Carolina Borges Monteiro ◽  
Rangel Arthur

There is no single and universal definition for ICT (information and communication technology). The term is normally adopted to all devices, networking components, applications, and systems that allow combined people, companies, and organizations (i.e., businesses, nonprofit agencies, governments, and enterprises) to interact in the digital world, the modern era. In this digitally globalized world, we deal with a huge set of data all the time. Data refers to facts, events, actions, activities, and transactions which have been and can be recorded (i.e., the raw material from which information is produced), nurturing the infrastructure and components that enable modern computing. Based on this, the present study aims to implement a discrete events-based model with advanced modulation format DQPSK in a simulation environment, the Simulink of MATLAB software, aiming to improve the transmission of information in communication systems. The results show better computational performance related to memory utilization related to compression of the information, showing an improvement of up to 92.6%.


2019 ◽  
Vol 8 (3) ◽  
pp. 1356-1361

Computer Networks are prone to be attacked by a number of network attacks. To protect an individual system or the entire network from the malicious behaviour, a high level security system is needed. Intrusion detection system (IDS) is a system which give such protection to the network from the intrusions like misuse, unauthorised access etc. Even though many forms of new attacks come into practice, providing the security for the system from the known attack is also a challenging task. The solution is a Signature based IDS which is a potential tool to identify the known attack, sending alert and protect the networks. So a novel signature based IDS(ORG-IDS) with four phases such as Feature Selection, Classification, Optimized Rule generation and Pattern matching is proposed. For any efficient signature based IDS, it should have the signature rules in less number but it should be effective in identifying attacks with good time and memory complexity. In this paper, a new algorithm is proposed for Rule generation phase of proposed IDS to configure the rules by implementing Ant Colony Optimization Technique with Association Rule Mining . The parameters like number of rules, running time and memory utilization are measured and proved that this proposed algorithm outperforms the other existing algorithms.


Author(s):  
Rosalind Deena Kumari ◽  
G. Radhamani

The recent tremendous increase in the malicious usage of the network has made it necessary that an IDS should encapsulate the entire network rather than at a system. This was the inspiration for the birth of a distributed intrusion detection system (DIDS). Different configurations of DIDSs have been actively used and are also rapidly evolving due to the changes in the types of threats. This chapter will give the readers an overview of DIDS and the system architecture. It also highlights on the various agents that are involved in DIDS and the benefits of the system. Finally, directions for future research work are discussed.


2012 ◽  
Vol 2 (3) ◽  
pp. 21-23
Author(s):  
Harpreet Kaur

Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.


Sign in / Sign up

Export Citation Format

Share Document