Skip to main content

A Novel Architecture for Detecting and Preventing Network Intrusions

  • Chapter
  • First Online:
Confidential Computing

Abstract

According to this paper, current network (N), intrusion (I), detection (D), and prevention (P) systems (S) formally (NIDPSs) have numerous flaws in detecting and preventing increasing undesirable visitors, in addition to a few risks in high-speed environments. It shows just how, inside the direction of high-speed as well as high load malicious visitors, NIDPS’s performance based on the decrease of packets, the big packets with no assessment, and then unable to identify the unwanted and bad traffic. A novel quality of service (QoS) architecture was used to improve the performance of intrusion detection and prevention process in the following research, we proposed and tested a solution that standard packets /traffic using a novel QoS configuration in a multi-layer switch and parallel techniques to speed up packet processing. The new architecture was tested in a variety of traffic conditions, including different speeds, types, and tasks. The experimental results show that the design develops a smooth function of flow in secured manner, allowing it to cover a wide range of scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shaik, S., Shaik, A.S.: Design of accessible display using ARM9 to control home area networks. Int. J. Sci. Eng. Technol. Res. (IJSETR) 03(40), 8046–8050 (2014). ISSN: 2319-8885

    Google Scholar 

  2. Wang, B., Zheng, Y., Lou, W., Hou, Y.T.: DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308–319 (2015)

    Article  Google Scholar 

  3. Chauhan, K., Prasad, V.: Distributed denial of service (DDoS) attack techniques and prevention on cloud environment. Int. J. Innov. Adv. Comput. Sci. 4, 210–215 (2015)

    Google Scholar 

  4. Samani, M.D., Karamta, M., Bhatia, J., Potdar, M.B.: Intrusion detection system for DoS attack in cloud. Int. J. Appl. Inf. Syst. (Foundation of Computer Science), 10(5) (2016)

    Google Scholar 

  5. Vasudeo, S.H., Patil, P., Kumar, R.V.: IMMIX-intrusion detection and prevention system. In: Proceedings of International Conference on Smart Technology Management Computing, Communication, Controls, Energy Mater. (ICSTM), pp. 96–101 (2015)

    Google Scholar 

  6. Bul’ajoul, W., James, A., Pannu, M.: Improving network intrusion detection system performance through quality of service configuration and parallel technology. J. Comput. Syst. Sci. 81(6), 981–999 (2015)

    Google Scholar 

  7. Akhtar, N., Matta, I., Wang, Y.: Managing NFV using SDN and control theory. Dept. CS, Boston Univ., Boston, MA, USA, Tech. Rep. BUCSTR-2015-013 (2015)

    Google Scholar 

  8. Prakash, L.N.C.K., Suryanarayana, G., Ansari, M.D., Gunjan, V.K.: Instantaneous approach for evaluating the initial centers in the agricultural databases using k-means clustering algorithm. J. Mobile Multimedia 18(1), 43–60 (2022)

    Google Scholar 

  9. Kenkre, P.S., Pai, A., Colaco, L.: Real time intrusion detection and prevention system. In: Proceedings of 3rd International Conference on Frontiers in Intelligent Computing, Theory and Application (FICTA), pp. 405–411. Springer, Bhubaneswar, India (2015)

    Google Scholar 

  10. Narayana, V.A., Premchand, P., Govardhan, A.: A novel and efficient approach for near duplicate page detection in web crawling. In: 2009 IEEE International Advance Computing Conference, IACC 2009 (2009)

    Google Scholar 

  11. Merugu, S., Reddy, M.C.S., Goyal, E., Piplani, L.: Text message classification using supervised machine learning algorithms. Lecture Notes in Electrical Engg. 500, 141–150 (2019)

    Google Scholar 

  12. Li, M., Deng, J., Liu, L., Long, Y., Shen, Z.: Evacuation simulation and evaluation of different scenarios based on traffic grid model and high performance computing. Int. Rev. Spatial Planning Sustain. Develop. 3(3), 4–15 (2015)

    Google Scholar 

  13. Kim, J.-M., Kim, A.-Y., Yuk, J.-S., Jung, H.-K.: A study on wireless intrusion prevention system based on snort. Int. J. Softw. Eng. Appl. 9(2), 1–12 (2015)

    Google Scholar 

  14. Vemuri, R.K., Reddy, P.C.S., Puneeth Kumar, B.S., Ravi, J., Sharma, S., Ponnusamy, S.: Deep learning based remote sensing technique for environmental parameter retrieval and data fusion from physical models. Arabian J. Geosci. 14(13) (2021)

    Google Scholar 

  15. Cisco (2016) Cisco Interfaces and Modules, Cisco Security Modules for Security Appliances. Accessed: Feb. 30, 2018. [Online]. Available: http://www.cisco.com/c/en/us/support/interfaces-modules/securitymodules-security-appliances/tsd-products-support-series-home.html

  16. Merugu, S., Jain, K., Mittal, A., Raman, B.: Sub-scene target detection and recognition using deep learning convolution neural networks—ICDSMLA 2020. Lecture Notes in Electrical Engineering, pp 1082–1101. Springer, Singapore (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Challa Madhavi Latha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Latha, C.M., Ahmed, M.M.R., Soujanya, K.L.S., Lalitha Parameswari, D.V. (2022). A Novel Architecture for Detecting and Preventing Network Intrusions. In: Garcia Diaz, V., Rincón Aponte, G.J. (eds) Confidential Computing. Advanced Technologies and Societal Change. Springer, Singapore. https://doi.org/10.1007/978-981-19-3045-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-3045-4_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-3044-7

  • Online ISBN: 978-981-19-3045-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics