Downloads: 142 | Views: 318
Research Paper | Information Technology | Kenya | Volume 7 Issue 3, March 2018 | Popularity: 6.9 / 10
Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer
Arphaxad Kioko Muia
Abstract: Around us are Computer networks that necessitate effective communication, sharing of knowledge, research and development, education modernization, e-commerce and entertainment just to mention a few. The present days network systems are increasingly getting exposed to many security threats and vulnerabilities including denial of service (DoS), scanning, password cracking, spoofing, eavesdropping, spamming, phishing, worms among others. These security threats and vulnerabilities have seen organizations and companies implement security policies for their networks. However, most of these security policies only inspect the network traffic passing through them denying or permitting packets passage based on their active set of rules. This ideally leaves the network exposed to attacks from outside and within. This paper presents technical evaluation methods for network security at the IP layer. This will be done through experiments on network traffic data. This will involve Network analyzers for collecting data from 15 entry points having a population of about 160 computers that will be processed by the various methods. To demonstrate the results, Network traffic graphs and figures will be used. Through Observations, analysis of the effects of certain behaviors will be done. This results will help in designing a method thats would simplify network security analysis at the IP Layer, in this case a hybrid method. The technical evaluation mainly focuses on deployment in real high speed networks. The method designed shall then be tested in a government ICT department network.
Keywords: Netflow data, Computer Networks, Intrusion Detection, Visualization, Collectors, Anomaly detection, Agents, Security analysis
Edition: Volume 7 Issue 3, March 2018
Pages: 1355 - 1362
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, United States of America, Volume 13 Issue 11, November 2024
Pages: 1257 - 1263Navigating Complexity: Chatbot Router Agents as a Key to Improved User Engagement in Healthcare
Venkateswara Siva Kishore Kancharla
Downloads: 4
Student Project, Information Technology, India, Volume 10 Issue 12, December 2021
Pages: 695 - 698Intrusion Detection using Machine Learning Techniques
Akshay Kaushik, Varun Goel
Downloads: 4 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 2487 - 2494Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices
Jeevan Manda
Downloads: 92
Research Paper, Information Technology, Ghana, Volume 7 Issue 9, September 2018
Pages: 559 - 563Examination of External and Internal Enablers of Organizational E-Readiness to Implement E-Commerce. A Study of Ghanas Financial Sector
Carlo K.M.H. Adadevoh, Benjamin Ntim
Downloads: 95
Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 1479 - 1482Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System
Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti