Abstract
According to this paper, current network (N), intrusion (I), detection (D), and prevention (P) systems (S) formally (NIDPSs) have numerous flaws in detecting and preventing increasing undesirable visitors, in addition to a few risks in high-speed environments. It shows just how, inside the direction of high-speed as well as high load malicious visitors, NIDPS’s performance based on the decrease of packets, the big packets with no assessment, and then unable to identify the unwanted and bad traffic. A novel quality of service (QoS) architecture was used to improve the performance of intrusion detection and prevention process in the following research, we proposed and tested a solution that standard packets /traffic using a novel QoS configuration in a multi-layer switch and parallel techniques to speed up packet processing. The new architecture was tested in a variety of traffic conditions, including different speeds, types, and tasks. The experimental results show that the design develops a smooth function of flow in secured manner, allowing it to cover a wide range of scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shaik, S., Shaik, A.S.: Design of accessible display using ARM9 to control home area networks. Int. J. Sci. Eng. Technol. Res. (IJSETR) 03(40), 8046–8050 (2014). ISSN: 2319-8885
Wang, B., Zheng, Y., Lou, W., Hou, Y.T.: DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308–319 (2015)
Chauhan, K., Prasad, V.: Distributed denial of service (DDoS) attack techniques and prevention on cloud environment. Int. J. Innov. Adv. Comput. Sci. 4, 210–215 (2015)
Samani, M.D., Karamta, M., Bhatia, J., Potdar, M.B.: Intrusion detection system for DoS attack in cloud. Int. J. Appl. Inf. Syst. (Foundation of Computer Science), 10(5) (2016)
Vasudeo, S.H., Patil, P., Kumar, R.V.: IMMIX-intrusion detection and prevention system. In: Proceedings of International Conference on Smart Technology Management Computing, Communication, Controls, Energy Mater. (ICSTM), pp. 96–101 (2015)
Bul’ajoul, W., James, A., Pannu, M.: Improving network intrusion detection system performance through quality of service configuration and parallel technology. J. Comput. Syst. Sci. 81(6), 981–999 (2015)
Akhtar, N., Matta, I., Wang, Y.: Managing NFV using SDN and control theory. Dept. CS, Boston Univ., Boston, MA, USA, Tech. Rep. BUCSTR-2015-013 (2015)
Prakash, L.N.C.K., Suryanarayana, G., Ansari, M.D., Gunjan, V.K.: Instantaneous approach for evaluating the initial centers in the agricultural databases using k-means clustering algorithm. J. Mobile Multimedia 18(1), 43–60 (2022)
Kenkre, P.S., Pai, A., Colaco, L.: Real time intrusion detection and prevention system. In: Proceedings of 3rd International Conference on Frontiers in Intelligent Computing, Theory and Application (FICTA), pp. 405–411. Springer, Bhubaneswar, India (2015)
Narayana, V.A., Premchand, P., Govardhan, A.: A novel and efficient approach for near duplicate page detection in web crawling. In: 2009 IEEE International Advance Computing Conference, IACC 2009 (2009)
Merugu, S., Reddy, M.C.S., Goyal, E., Piplani, L.: Text message classification using supervised machine learning algorithms. Lecture Notes in Electrical Engg. 500, 141–150 (2019)
Li, M., Deng, J., Liu, L., Long, Y., Shen, Z.: Evacuation simulation and evaluation of different scenarios based on traffic grid model and high performance computing. Int. Rev. Spatial Planning Sustain. Develop. 3(3), 4–15 (2015)
Kim, J.-M., Kim, A.-Y., Yuk, J.-S., Jung, H.-K.: A study on wireless intrusion prevention system based on snort. Int. J. Softw. Eng. Appl. 9(2), 1–12 (2015)
Vemuri, R.K., Reddy, P.C.S., Puneeth Kumar, B.S., Ravi, J., Sharma, S., Ponnusamy, S.: Deep learning based remote sensing technique for environmental parameter retrieval and data fusion from physical models. Arabian J. Geosci. 14(13) (2021)
Cisco (2016) Cisco Interfaces and Modules, Cisco Security Modules for Security Appliances. Accessed: Feb. 30, 2018. [Online]. Available: http://www.cisco.com/c/en/us/support/interfaces-modules/securitymodules-security-appliances/tsd-products-support-series-home.html
Merugu, S., Jain, K., Mittal, A., Raman, B.: Sub-scene target detection and recognition using deep learning convolution neural networks—ICDSMLA 2020. Lecture Notes in Electrical Engineering, pp 1082–1101. Springer, Singapore (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Latha, C.M., Ahmed, M.M.R., Soujanya, K.L.S., Lalitha Parameswari, D.V. (2022). A Novel Architecture for Detecting and Preventing Network Intrusions. In: Garcia Diaz, V., Rincón Aponte, G.J. (eds) Confidential Computing. Advanced Technologies and Societal Change. Springer, Singapore. https://doi.org/10.1007/978-981-19-3045-4_16
Download citation
DOI: https://doi.org/10.1007/978-981-19-3045-4_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-3044-7
Online ISBN: 978-981-19-3045-4
eBook Packages: Computer ScienceComputer Science (R0)