The Penta Preamble of Intrusion Detection Systems - Network Intrusions, Attack Symptoms, Tasks, Components, and Architecture

Authors

  • G. Nanda Kishor Kumar  Research Scholar ,SUNRISE University, Alwar, Rajasthan, India
  • Dr. R. K. Sharma   Professor, Department of ECE, SUNRISE University, Alwar, Rajasthan, India

Keywords:

Component, Detection, Intrusion, synchronized, System

Abstract

Vigorously Intrusion Detection System (IDS) is very strong defence organizational organ in computer world. Gregariously network has been prominently playing a key role, even though a lot of hazardous attacks trying to be evoked. In the vulnerability of packet sending there would be crystallized chance to lose the value data. The symptoms would have been, in IDS, which is a organized organ in the digital based arena, observed based on certain risk factors in connection with IDS. The basic components which have been analyzed and added in the research article pointing of about intrusion in the attacks. The identification of the last data can be possible through various methods which are directly and indirectly connected with Intrusion Detection System. The synchronized and structured data can be retrieved by having IDS inclusion of the data. The mastery role of IDS in the five elements, have a distinguished structured. In this article the penta elements have been exposed to the best work done by IDS.

References

  1. E. Amoroso, Wykrywanie intruzow, Wydawnictwo RM, Warszawa 1999 (in Polish).
  2. B. Mukherjee, T.L. Heberlein, K.N. Levitt, Network intrusion detection, IEEE Network 8 (3), 1994, pages 26-41.
  3. P. Dorosz, P. Kazienko, Systemy wykrywania intruzow, VI Krajowa Konferencja Zastosowan Kryptografii ENIGMA 2002, Warsaw 14-17 05.2002. , p. TIV 47-78, http://www.enigma.com.pl/konferencje/vi_kkzk/index.htm. (in Polish)
  4. G. Mansfield, K. Ohta, Y. Takei, N. Kato, Y. Nemoto, Towards trapping wily intruders in the large, Computer Networks 34, 2000, pages 659-670.
  5. C. Stoll, Kukulcze jajo, Rebis, Poznan 1998. (in Polish
  6. H. Debar, M. Dacier, A. Wespi, Towards a taxonomy of intrusion-detection systems, Computer Networks 31, 1999, pages 805-822.
  7. E. Lundin, E. Jonsson, Survey of research in the intrusion detection area, Technical report 02-04, Department of Computer Engineering, Chalmers University of Technology, Goteborg January 2002, http://www.ce.chalmers.se/staff/emilie/papers/Lundin_survey02.pdf.
  8. C. Krugel, T. Toth, Applying Mobile Agent Technology to Intrusion Detection, ICSE Workshop on Software Engineering and Mobility, Toronto May 2001, http://www.elet.polimi.it/Users/DEI/Sections/Compeng/GianPietro.Picco/ICSE01mobility/papers/krugel.pdf.
  9. C. Krugel, T. Toth, Distributed Pattern Detection for Intrusion Detection, Conference Proceedings of the Network and Distributed System Security Symposium NDSS '02, 2002, http://www.isoc.org/isoc/conferences/ndss/02/proceedings/papers/kruege.ps.
  10. J.S. Balasubramaniyan, J.O. Garcia-Fernandez, D. Isaco, E. Spafford, D. Zamboni, An Architecture for Intrusion Detection using Autonomous Agents, 14th IEEE Computer Security Applications Conference ACSAC '98, December 1998, pages 13-24, http://www.cs.umbc.edu/cadip/docs/NetworkIntrusion/tr9805.ps.
  11. D.J. Ragsdale, C.A. Carver, J.W. Humphries, U.W. Pooh, Adaptation techniques for intrusion detection and intrusion response systems, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2000, pages 2344-2349, http://www.itoc.usma.edu/ragsdale/pubs/adapt.pdf.
  12. E.H. Spafford, D. Zamboni, Intrusion detection using autonomous agents, Computer Networks 34, 2000, pages 547-570.

Downloads

Published

2016-12-30

Issue

Section

Research Articles

How to Cite

[1]
G. Nanda Kishor Kumar, Dr. R. K. Sharma , " The Penta Preamble of Intrusion Detection Systems - Network Intrusions, Attack Symptoms, Tasks, Components, and Architecture , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.1369-1377, March-April-2016.