intrusion prevention system
Recently Published Documents


TOTAL DOCUMENTS

165
(FIVE YEARS 48)

H-INDEX

9
(FIVE YEARS 1)

2021 ◽  
Vol 15 (4) ◽  
pp. 461-465
Author(s):  
Deval Gusrion ◽  
Silky Safira ◽  
Retno Devita ◽  
Ruri Hartika Zain ◽  
Rini Sovia

Cloud computing is a form of technological progress that has developed along with the times, this has spurred the increasing use of the internet. By usingtechnology internet that is able to implement server a virtual, which has the aim of building a cloud computing server at the District Communications and Information Office. Padang Pariaman uses the Operating System (OS) Proxmox VE (Virtual Environment) 6.4. Cloud computing is able to provide storage services that can be used simultaneously. The results of this study produce a cloud computing server that implements a security system with themethods ids (intrusion detection system) and ips (intrusion prevention system)that are able to process data(storagestorage), use software simultaneously in the network, and use infrastructure within the scope of this research.network cloud computing at the District Communications and Information Office. Padang Pariaman using aservice model private cloud


2021 ◽  
Vol 1 (2) ◽  
pp. 113-122
Author(s):  
Rachmat Muwardi ◽  
Hongmin Gao ◽  
Harun Usman Ghifarsyam ◽  
Mirna Yunita ◽  
Andika Arrizki ◽  
...  

The development of information technology nowadays has become faster, and this makes network security become important. A huge increasing number of computers that are connected makes many gaps in a network. An administrator has an important role in protecting the security of the network. The problem comes when an administrator has human problems such as pain, negligence, and tiredness while needing rapid information when there is an intrusion on the network. This problem can be solved by adding a data traffic detection system known as Intrusion Detection System (IDS). IDS will be connected to Mail Gateway until that administrator can receive notifications such as alerts during an intrusion to the network anytime and anywhere. Snort as one of the network security systems should be developed as a security detection system and network security. A security intrusion prevention system or an Intrusion Prevented System (IPS). The author tries to do analysis and testing on the subjects above to produce a system capable of detecting the intruder in a network that is mobile and also makes it easy for administrators to open data anywhere and anytime using any device.


Author(s):  
Gabriel Marvel Vaz ◽  
Tiago Antonio Rizzetti ◽  
Walter Priesnitz Filho

Neste artigo é apresentado um estudo de caso sobre a implantação de um ambiente de prevenção de intrusões em uma rede de computadores de uma instituição de ensino. A arquitetura adotada baseou-se em utilizar um Network Intrusion Prevention System (NIPS) em conjunto com Host Intrusion Prevention System (HIPS), a fim de detectar e bloquear ataques destinados à rede. O software Suricata foi configurado inline, filtrando o tráfego da rede. Para visualização dos logs, a pilha Elasticsearch, Logstash e Kibana (ELK) foi configurada em conjunto com a ferramenta Synesis, permitindo a visualização dos dados através de uma interface Web. Com isso, foi possível detectar e bloquear ameaças, dentre elas varreduras, comunicações originadas por hosts maliciosos entre outras. A partir disso, foram tomadas ações como a adição de novas regras de firewall, criação de uma blacklist, dentre outras medidas que contribuíram para elevar o nível de segurança da rede.


2021 ◽  
Vol 14 (4) ◽  
pp. 45-57
Author(s):  
Priti Narwal ◽  
Deepak Kumar ◽  
Shailendra Narayan Singh ◽  
Peeyush Tewari

DoS (denial of service) assault is the most prevalent assault these days. It imposes a major risk to cybersecurity. At the point when this assault is propelled by numerous conveyed machines on a solitary server machine, it is called as a DDoS (distributed denial of service) assault. Additionally, DoS bypass on DHCP (dynamic host configuration protocol) server assault is a rising and famous assault in a system. The authors have proposed a stochastic intrusion detection game-based arrangement utilizing controlled Markov chain that figures the transition probabilities starting with one state then onto the next in a state transition diagram. At first, the authors have conjectured these assaults, and after that, they proposed a methodology that uses the idea of master and slave IPS (intrusion prevention system). This approach works well when mapped to these estimated assaults and accordingly helps in the recognition and counteractive action of these assaults in a cloud domain.


2021 ◽  
Author(s):  
Hyeokchan Kwon ◽  
Byungho Chung

UNSTRUCTURED Ransomware attacks, such as Conti, Ryuk, Petya, and Sodinokibi, that target medical institutions are increasing rapidly. In 2020, in the United States., ransomware attacks affected over 600 separate clinics, hospitals, and organizations, and more than 18 million patient records. The cost of these attacks is estimated to be almost $21 billion USD [1]. The first death related to ransomware attacks was reported by the University Hospital of Düsseldorf in Germany in 2020. The aim of this literature is to study vulnerabilities of cybersecurity in medical institutions, characteristics of ransomware aimed at medical institutions, and technical measures to prevent ransomware. From a security point of view, one of the most important targets of hackers against hospitals is medical devices. Many medical devices in hospitals are equipped with outdated software that is vulnerable to security and have many restrictions on security patches/updates. In addition, it is not easy to install even security functions such as antivirus due to the specificity of medical devices where availability is most important. As introduced in the Medjack report issued by TrapX Labs, in many cases, attackers target medical devices that are relatively insecure and then penetrate deep into more critical network infrastructure, such as EMR servers [2]. In this literature, we discuss various considerations to respond to ransomware while ensuring the availability of medical devices, and present AI-MDIPS (AI-based medical device intrusion prevention system) technology, a non-invasive and manageable security technology applicable to medical devices developed by the Korean government


2021 ◽  
Vol 11 (3) ◽  
pp. 231-237
Author(s):  
Vipparthy Praneeth ◽  
Kontham Raja Kumar ◽  
Nagarjuna Karyemsetty

Internet of vehicles supports to transfer of safety-related messages, which help to mitigate road accidents. Internet of vehicles allows vehicle to cooperative communicate, share position and speed data among vehicles and road side units. The vehicular network become prone to large number of attacks including false warnings, mispositioning of vehicles etc. The authentication of messages to identify the normal message packet from attack messages packet and its prevention is a major challenging task. This paper focuses on applying deep learning approach using binary classification to classify the normal packets from malicious packets. The process starts with preparing the training dataset from the open-source KDD99 and CICIDS 2018 datasets, consisting of 1,20,223 network packets with 41 features. The one-dimensional network data is preprocessed using an autoencoder to eliminate the unwanted data in the initial stage. The valuable features are then filtered as 23 out of 41, and the model is trained with structured deep neural networks, then combined with the Softmax classifier and Relu activation functions. The proposed Intrusion prevention model is trained and tested with google Colab, an open platform cloud service, and the open-source tensor flow. The proposed prevention classifier model was validated with the simulation dataset generated in network simulation. The experimental results show 99.57% accuracy, which is the highest among existing RNN and CNN-based models. In the future, the model can be trained on different datasets, which will further improve the model's efficiency and accuracy.


2021 ◽  
Vol 5 (1) ◽  
pp. 60-69
Author(s):  
Farid Wahyudi ◽  
◽  
Listanto Tri Utomo ◽  

Security is very main in computer networks, where many devices are connected to each other to interact and exchange data without limits. Network security is also a very important issue to prioritize, one of which is to use an intrusion prevention system. At PDTI UNIRA there are often network security problems, one of which is that during the test season, the server experiences many intrusion problems. The purpose of this research is to develop a social science system based on the analysis at PDTI of Raden Rahmat Islamic University Malang. This research method uses a computer security development approach, namely the Intrusion Prevention System (IPS), by combining firewall engineering methods and Intrusion-Detection System (IDS). The result of this research is a technology that can be used to prevent attacks that will enter the local network checking and recording all data packets and recognizing sensor packets, when the attack has been identified, IPS will deny access (block) and record (log) all data packets. identified. So IPS acts as a firewall that will allow and block combined with IDS that can detect packets in detail. With a network security system, the Unira PDTI server is safer and can avoid intrusion.


Sign in / Sign up

Export Citation Format

Share Document