Downloads: 142
Research Paper | Information Technology | Kenya | Volume 7 Issue 3, March 2018
Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer
Arphaxad Kioko Muia
Abstract: Around us are Computer networks that necessitate effective communication, sharing of knowledge, research and development, education modernization, e-commerce and entertainment just to mention a few. The present days network systems are increasingly getting exposed to many security threats and vulnerabilities including denial of service (DoS), scanning, password cracking, spoofing, eavesdropping, spamming, phishing, worms among others. These security threats and vulnerabilities have seen organizations and companies implement security policies for their networks. However, most of these security policies only inspect the network traffic passing through them denying or permitting packets passage based on their active set of rules. This ideally leaves the network exposed to attacks from outside and within. This paper presents technical evaluation methods for network security at the IP layer. This will be done through experiments on network traffic data. This will involve Network analyzers for collecting data from 15 entry points having a population of about 160 computers that will be processed by the various methods. To demonstrate the results, Network traffic graphs and figures will be used. Through Observations, analysis of the effects of certain behaviors will be done. This results will help in designing a method thats would simplify network security analysis at the IP Layer, in this case a hybrid method. The technical evaluation mainly focuses on deployment in real high speed networks. The method designed shall then be tested in a government ICT department network.
Keywords: Netflow data, Computer Networks, Intrusion Detection, Visualization, Collectors, Anomaly detection, Agents, Security analysis
Edition: Volume 7 Issue 3, March 2018,
Pages: 1355 - 1362
Similar Articles with Keyword 'Computer Networks'
Downloads: 114
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1576 - 1580Intrusion Detection in Wireless Network Using Fuzzy Rules
Ketaki P. Bhusari | Swati G. Kale
Downloads: 120
Research Paper, Information Technology, India, Volume 5 Issue 5, May 2016
Pages: 1049 - 1054Role of ICT for Rural Development in Haryana
Kamaldeep Sangwan | Komal [72]