Abstract
In the era of cyberspace, enforcing an Intrusion Detection System (IDS) and Firewall on a system is a common practice among network administrators or engineers. But, with the due time, just implementing IDS and firewall isn’t just enough to secure our systems, especially with the present trend of spreading new malware attacks. Its quite easy to victimize a machine, even with IDS and firewalls enforced on the networks by easily uploading shells in the form of pdf, jpg, txt, etc. Due to which machine can easily be victimized without much effort, for this, we probe to apply a new approach to overcome this anomaly. Understandably, with the increasing demand for IoT devices in the market, safeguarding these devices are also a big challenge. Motivated by this problem, we try to perform inspections to maintain stability and functionality by adding code that allows the application to keep track of operating constraints of the application during an attack. Hence, in the background of this, we discuss intrusion detection systems, firewalls, and applicability. Further, we tend to identify open challenges in this direction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Meng, W., Tischhauser, E.W., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access 6, 10179–10188 (2018)
Axelrod, C.W.: The need for functional security testing. STSC CrossTalk. J. Defense Softw. Eng. 17–21 (2011)
Osken, S., Yildirim, E.N., Karatas, G., Cuhaci, L.: Intrusion detection systems with deep learning: a systematic mapping study. In: IEEE Scientific Meeting on Electrical-Electronics & Biomedical Engineering and Computer Science (EBBT), pp. 1–4, Apr 2019
Ugochukwu, C.J., Bennett, E.O.: An intrusion detection system using machine learning algorithm. Int. J. Comput. Sci. Math. Theory 4(1), 39–47 (2018)
Yuan, H., Zheng, L., Qiu, S., Peng, X., Liang, Y., Hu, Y., Deng, G.: Design and implementation of enterprise network security system based on firewall. In: The International Conference on Cyber Security Intelligence and Analytics, pp. 1070–1078. Springer, Cham, Feb, 2019
Vetriselvi, V., Shruti, P.S., Abraham, S.: Two-level intrusion detection system in sdn using machine learning. In: International Conference on Communications and Cyber Physical Engineering, pp. 449–461. Springer, Singapore, Jan 2018
Gaigole, M.S., Kalyankar, M.A.: The study of network security with its penetrating attacks and possible security mechanisms. Int. J. Comput. Sci. Mobile Comput. 4(5), 729 (2015)
McCormac, A., Parsons, K., Butavicius, M.: Preventing and profiling malicious insider attacks (No. DSTO-TR-2697). Defence Science and Technology Organization Edinburgh (Australia) Command Control Communications and Intelligence Division (2012)
Culbert, P.: U.S. Patent No. 7,512,781. Washington, DC: U.S. Patent and Trademark Office (2009)
Zalenski, R.: Firewall technologies. IEEE Potentials 21(1), 24–29 (2002)
Mishra, S.K., Sahoo, B., Jena, S.K.: A secure VM consolidation in cloud using learning automata. Recent Findings in Intelligent Computing Techniques, pp. 617–623. Springer, Singapore (2019)
Puthal, D., Ranjan, R., Nanda, A., Nanda, P., Jayaraman, P.P., Zomaya, A.Y.: Secure authentication and load balancing of distributed edge datacenters. J. Parallel Distrib. Comput. 124, 60–69 (2019)
Waidyarathna, D.W.Y.O., Nayantha, W.V.A.C., Wijesinghe, W.M.T.C., Abeywardena, K.Y.: Intrusion detection system with correlation engine and vulnerability assessment. Int. J. Adv. Comput. Sci. Appl. 9(9), 365–370 (2018)
Athira, A.B., Pathari, V.: Standardisation and classification of alerts generated by intrusion detection systems. Int. J. Cybern. Inf. (IJCI) 5(2), 21–29 (2016)
Mazurczyk, W., Caviglione, L.: Steganography in modern smartphones and mitigation techniques. IEEE Commun. Surveys Tutor. 17(1), 334–357 (2014)
Prakash, A., Satish, M., Bhargav, T.S.S., Bhalaji, N.: Detection and mitigation of denial of service attacks using stratified architecture. Procedia Comput. Sci. 87, 275–280 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chattopadhyay, S., Mishra, S., Mishra, S.K. (2021). A Static Approach for Access Control with an Application-Derived Intrusion System. In: Mishra, D., Buyya, R., Mohapatra, P., Patnaik, S. (eds) Intelligent and Cloud Computing. Smart Innovation, Systems and Technologies, vol 194. Springer, Singapore. https://doi.org/10.1007/978-981-15-5971-6_81
Download citation
DOI: https://doi.org/10.1007/978-981-15-5971-6_81
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5970-9
Online ISBN: 978-981-15-5971-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)