International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 142 | Views: 318

Research Paper | Information Technology | Kenya | Volume 7 Issue 3, March 2018 | Popularity: 6.9 / 10


     

Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia


Abstract: Around us are Computer networks that necessitate effective communication, sharing of knowledge, research and development, education modernization, e-commerce and entertainment just to mention a few. The present days network systems are increasingly getting exposed to many security threats and vulnerabilities including denial of service (DoS), scanning, password cracking, spoofing, eavesdropping, spamming, phishing, worms among others. These security threats and vulnerabilities have seen organizations and companies implement security policies for their networks. However, most of these security policies only inspect the network traffic passing through them denying or permitting packets passage based on their active set of rules. This ideally leaves the network exposed to attacks from outside and within. This paper presents technical evaluation methods for network security at the IP layer. This will be done through experiments on network traffic data. This will involve Network analyzers for collecting data from 15 entry points having a population of about 160 computers that will be processed by the various methods. To demonstrate the results, Network traffic graphs and figures will be used. Through Observations, analysis of the effects of certain behaviors will be done. This results will help in designing a method thats would simplify network security analysis at the IP Layer, in this case a hybrid method. The technical evaluation mainly focuses on deployment in real high speed networks. The method designed shall then be tested in a government ICT department network.


Keywords: Netflow data, Computer Networks, Intrusion Detection, Visualization, Collectors, Anomaly detection, Agents, Security analysis


Edition: Volume 7 Issue 3, March 2018


Pages: 1355 - 1362



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Arphaxad Kioko Muia, "Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer", International Journal of Science and Research (IJSR), Volume 7 Issue 3, March 2018, pp. 1355-1362, https://www.ijsr.net/getabstract.php?paperid=ART2018861, DOI: https://www.doi.org/10.21275/ART2018861



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, United States of America, Volume 13 Issue 11, November 2024

Pages: 1257 - 1263

Navigating Complexity: Chatbot Router Agents as a Key to Improved User Engagement in Healthcare

Venkateswara Siva Kishore Kancharla

Share this Article

Downloads: 4

Student Project, Information Technology, India, Volume 10 Issue 12, December 2021

Pages: 695 - 698

Intrusion Detection using Machine Learning Techniques

Akshay Kaushik, Varun Goel

Share this Article

Downloads: 4 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2487 - 2494

Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices

Jeevan Manda

Share this Article

Downloads: 92

Research Paper, Information Technology, Ghana, Volume 7 Issue 9, September 2018

Pages: 559 - 563

Examination of External and Internal Enablers of Organizational E-Readiness to Implement E-Commerce. A Study of Ghanas Financial Sector

Carlo K.M.H. Adadevoh, Benjamin Ntim

Share this Article

Downloads: 95

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article



Top