International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 159

Research Paper | Computer Science & Engineering | India | Volume 7 Issue 3, March 2018


Design and Implementation of Router Intrusion Detection and Protection Systems

Nareshkumar D. Harale [2] | Dr. B. B. Meshram [2]


Abstract: - Attackers most of the time attack the gateway routers software and make the router to behave in a malicious way. This Paper focuses on various attacks and how these attacks will be detected successfully by router log analysis. This paper also illustrates the proposed software architecture, its data structure and algorithms for the detection and protection of the router intrusions. So in this way in proposed system, logs are used to detect attack and also give defense mechanism for the detected attacks. The main aim of the work is to give details about how to communicate with the router from the program to turn ON only needed debugging, Collect router logs in a separate Syslog server, Segregate log files based on protocols, Analyze the log files to detect malicious attacks or misconfiguration, Communicate with the router again to apply appropriate access lists as defense mechanism and Save the logs report. Due to space constraints, some of the screen shots are shown. This work looks at some of the techniques to improve the accuracy of automated log analysis and make it a cost-effective tool for network management and improving network reliability.


Keywords: System Integrity, Router Configuration, Network Security, Routing Systems, Routing Algorithms, Router Intrusion Detection Systems, Router Intrusion Protection Systems


Edition: Volume 7 Issue 3, March 2018,


Pages: 605 - 612


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Nareshkumar D. Harale, Dr. B. B. Meshram, "Design and Implementation of Router Intrusion Detection and Protection Systems", International Journal of Science and Research (IJSR), Volume 7 Issue 3, March 2018, pp. 605-612, https://www.ijsr.net/get_abstract.php?paper_id=ART20173199

Similar Articles with Keyword 'System Integrity'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 1659 - 1668

Anomaly Detection: Enhancing Systems with Machine Learning

Yogananda Domlur Seetharama [3]

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1391 - 1393

A Survey on Integrity Protection Mechanisms for Open Mobile Platform

Alankrita Ladage [2] | Prof. T. H. Gurav

Share this Article
Top