Advertisement

Hybrid Triodetection Approach: A Framework for Intrusion Detection

  • M. Mahithaa SreeEmail author
  • M. SaranyaEmail author
  • S. Prayla ShyryEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)

Abstract

With the emerging technologies in the internet, internal network security became a challenging issue in cyberspace. Though there are numerous devices and mechanisms to restrict the intruder attacks, the present inventions fall short of the mark due to the lack of accuracy. System access controls became a challenging dead weight even to the secure systems. The major productive defense today is use of intrusion detection system (IDS) and firewall. IDS works beyond the firewall by providing the protection to the network from internal and external attacks. However, firewall uses the same policy with minor defects. Hence the combination of firewall and IDS will be a better way for detecting vulnerability. This paper deals with three-layered approach like firewall, hybrid IDS and audit data which examines process involved in utilizing each of tools and elaborates their features and the proposed work extends the accuracy by providing dynamic security by trio-detection process.

Keywords

Acoustic Audit data Cyberspace Firewall IDS Network security 

References

  1. 1.
    Diaz-Gomez, P.A., Hougen, D.F.: MISUSE DETECTION: An Iterative Process vs. A Genetic Algorithm Approach. Robotics, Evolution, Adaptation, and Learning Laboratory(REAL Lab). https://cameron.edu/~pdiaz-go/Iter_GAsMisUseF
  2. 2.
  3. 3.
    Goeldenitz, T.: “IDS-Today and Tomorrow”. SANS Institute InfoSec Reading RoomGoogle Scholar
  4. 4.
    Vijayarani, S., Maria Sylviaa, S.: Intrusion detection system-a study. Int. J. Secure. Priv. Trust Manage. (IJSPTM) 4(1) (2015)Google Scholar
  5. 5.
    Anand, A., Patel, B.: An overview on intrusion detection system and types of attacks it can detect considering different protocols. Int. J. Adv. Res. Comput. Sci. Software Eng. 2(8), (2012). ISSN:2277 128XGoogle Scholar
  6. 6.
    Blair, R., Durai, A.:Types of Firewalls. Network World, 21 May 2009Google Scholar
  7. 7.
  8. 8.
    Chakraborty, N.: Intrusion detection systems and intrusion prevention system: a comparative study. Int. J. Res. (IJCBR) 4(2), (2013). ISSN(Online): 2229-666Google Scholar
  9. 9.
    Stiawan, D., Shakhatreh, A.Y.I., Idris, M.Y., Abdullah, K.: Intrusion prevention system: a survey. J. Theor. Appl. Inf. Technol. 7(4), 44–54 (2012)Google Scholar
  10. 10.
    Singh, S.: Intrusion detection system (ids) and intrusion prevention systems (ips) for network security: a critical analysis. IJREAS 3(3) (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of ComputingSathyabama Institute of Science and TechnologyChennaiIndia

Personalised recommendations