International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 267

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014 | Popularity: 6.6 / 10


     

Ontological IDS Monitoring On Defined Attack

Vinod Kumar Shukla, D. B. Ojha


Abstract: Internet growth has become the challenge for the internet security. Our paper is divided into four sections. Section I is introduction. Section II is based on the concepts of SNMP, MIB, IDS and Ontology. In subsequent sections there is discussion about our proposed method in which, we have taken a model of manager and agent communication. All agents in one network communicate to one manager. Manager take the responsibility for identifying and defining the new type of Intrusion based on communication done between manager and agent. If intrusion is confirmed then immediately and ontology will be formed by manager and communicated to all managed devices in network with the help of Ontology, it will help all the managed devices on the network to update their intrusion signature database. By this all the devices on the network can be more secure and monitoring will be more updated.


Keywords: SNMP, MIB, IDS, Onotology, OWL-DL


Edition: Volume 3 Issue 3, March 2014


Pages: 665 - 670



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Vinod Kumar Shukla, D. B. Ojha, "Ontological IDS Monitoring On Defined Attack", International Journal of Science and Research (IJSR), Volume 3 Issue 3, March 2014, pp. 665-670, https://www.ijsr.net/getabstract.php?paperid=20131255, DOI: https://www.doi.org/10.21275/20131255



Similar Articles

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 11, November 2024

Pages: 851 - 855

Chaos Testing: A Proactive Framework for System Resilience in Distributed Architectures

Chandra Shekhar Pareek

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 1816 - 1822

Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing

Pushpjeet Cholkar, Dr. Margi Patel

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Book Chapter, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 836 - 846

A Comprehensive Introduction to SDN Architectural Foundations and Applications

Dr. Yogita Hande, Dr. Rupali Vairagade

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021

Pages: 158 - 161

MLP and RNN Based Intrusion Detection System Using Machine Learning with Stochastic Optimization

Mithlesh Kumar, Gargishankar Verma

Share this Article



Top