Skip to main content

A Static Approach for Access Control with an Application-Derived Intrusion System

  • Conference paper
  • First Online:
Intelligent and Cloud Computing

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 194))

  • 861 Accesses

Abstract

In the era of cyberspace, enforcing an Intrusion Detection System (IDS) and Firewall on a system is a common practice among network administrators or engineers. But, with the due time, just implementing IDS and firewall isn’t just enough to secure our systems, especially with the present trend of spreading new malware attacks. Its quite easy to victimize a machine, even with IDS and firewalls enforced on the networks by easily uploading shells in the form of pdf, jpg, txt, etc. Due to which machine can easily be victimized without much effort, for this, we probe to apply a new approach to overcome this anomaly. Understandably, with the increasing demand for IoT devices in the market, safeguarding these devices are also a big challenge. Motivated by this problem, we try to perform inspections to maintain stability and functionality by adding code that allows the application to keep track of operating constraints of the application during an attack. Hence, in the background of this, we discuss intrusion detection systems, firewalls, and applicability. Further, we tend to identify open challenges in this direction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Meng, W., Tischhauser, E.W., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access 6, 10179–10188 (2018)

    Article  Google Scholar 

  2. Axelrod, C.W.: The need for functional security testing. STSC CrossTalk. J. Defense Softw. Eng. 17–21 (2011)

    Google Scholar 

  3. Osken, S., Yildirim, E.N., Karatas, G., Cuhaci, L.: Intrusion detection systems with deep learning: a systematic mapping study. In: IEEE Scientific Meeting on Electrical-Electronics & Biomedical Engineering and Computer Science (EBBT), pp. 1–4, Apr 2019

    Google Scholar 

  4. Ugochukwu, C.J., Bennett, E.O.: An intrusion detection system using machine learning algorithm. Int. J. Comput. Sci. Math. Theory 4(1), 39–47 (2018)

    Google Scholar 

  5. Yuan, H., Zheng, L., Qiu, S., Peng, X., Liang, Y., Hu, Y., Deng, G.: Design and implementation of enterprise network security system based on firewall. In: The International Conference on Cyber Security Intelligence and Analytics, pp. 1070–1078. Springer, Cham, Feb, 2019

    Google Scholar 

  6. Vetriselvi, V., Shruti, P.S., Abraham, S.: Two-level intrusion detection system in sdn using machine learning. In: International Conference on Communications and Cyber Physical Engineering, pp. 449–461. Springer, Singapore, Jan 2018

    Google Scholar 

  7. Gaigole, M.S., Kalyankar, M.A.: The study of network security with its penetrating attacks and possible security mechanisms. Int. J. Comput. Sci. Mobile Comput. 4(5), 729 (2015)

    Google Scholar 

  8. McCormac, A., Parsons, K., Butavicius, M.: Preventing and profiling malicious insider attacks (No. DSTO-TR-2697). Defence Science and Technology Organization Edinburgh (Australia) Command Control Communications and Intelligence Division (2012)

    Google Scholar 

  9. Culbert, P.: U.S. Patent No. 7,512,781. Washington, DC: U.S. Patent and Trademark Office (2009)

    Google Scholar 

  10. Zalenski, R.: Firewall technologies. IEEE Potentials 21(1), 24–29 (2002)

    Article  Google Scholar 

  11. Mishra, S.K., Sahoo, B., Jena, S.K.: A secure VM consolidation in cloud using learning automata. Recent Findings in Intelligent Computing Techniques, pp. 617–623. Springer, Singapore (2019)

    Chapter  Google Scholar 

  12. Puthal, D., Ranjan, R., Nanda, A., Nanda, P., Jayaraman, P.P., Zomaya, A.Y.: Secure authentication and load balancing of distributed edge datacenters. J. Parallel Distrib. Comput. 124, 60–69 (2019)

    Article  Google Scholar 

  13. Waidyarathna, D.W.Y.O., Nayantha, W.V.A.C., Wijesinghe, W.M.T.C., Abeywardena, K.Y.: Intrusion detection system with correlation engine and vulnerability assessment. Int. J. Adv. Comput. Sci. Appl. 9(9), 365–370 (2018)

    Google Scholar 

  14. Athira, A.B., Pathari, V.: Standardisation and classification of alerts generated by intrusion detection systems. Int. J. Cybern. Inf. (IJCI) 5(2), 21–29 (2016)

    Google Scholar 

  15. Mazurczyk, W., Caviglione, L.: Steganography in modern smartphones and mitigation techniques. IEEE Commun. Surveys Tutor. 17(1), 334–357 (2014)

    Article  Google Scholar 

  16. Prakash, A., Satish, M., Bhargav, T.S.S., Bhalaji, N.: Detection and mitigation of denial of service attacks using stratified architecture. Procedia Comput. Sci. 87, 275–280 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaunak Chattopadhyay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chattopadhyay, S., Mishra, S., Mishra, S.K. (2021). A Static Approach for Access Control with an Application-Derived Intrusion System. In: Mishra, D., Buyya, R., Mohapatra, P., Patnaik, S. (eds) Intelligent and Cloud Computing. Smart Innovation, Systems and Technologies, vol 194. Springer, Singapore. https://doi.org/10.1007/978-981-15-5971-6_81

Download citation

Publish with us

Policies and ethics