Review on Implementation of Intrusion Detection in Physical Network

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-20 Number-2
Year of Publication : 2015
Authors : Chinmay Karadkar , Ketan Thuturkar , Ketan Ghatole , Harsh Patel , Roshan Thakur
  10.14445/22312803/IJCTT-V20P113

MLA

Chinmay Karadkar , Ketan Thuturkar , Ketan Ghatole , Harsh Patel , Roshan Thakur "Review on Implementation of Intrusion Detection in Physical Network". International Journal of Computer Trends and Technology (IJCTT) V20(2):66-69, Feb 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Network infrastructure security have become a major concern with the extensively growing computing environment. A malicious activity made with an intension to disrupt the functioning of the network is termed as intrusion. Intrusion can have its root effects varying in a wide range, including individual host, resources and the network infrastructure itself. HIDS functions at the primary stage where it prevents unauthorized access to the host. NIDS ensures secure communication within the network and entail misuse of resources. NIDS may fail in switching environments hence HIDS should be incorporated to enable additional security. A Hybrid IDS is a mechanism which functions to examine activities such as login attempts, system files integrity, monitoring and analysis of individual packet from host and network domain respectively. It significance comes to fore when others preventive measure such as firewall, etc. fails. This paper describes the implementation of such a hybrid system with an objective to ensure network integrity by taking effective measures to provide reluctance to the attacks.

References
[1] R Rangadurai Karthick, Vipuk P. Hattiwale, Balaraman Ravindran, “Adaptive Network Intrusion Detection System Using a Hybrid Approach”, IEEE 2012
[2] Zhou hunyue, Lie Yun and Zhang Hongke, “A Pattern matching based Network Intrusion Detection System”, ICARCV, IEEE 2006.
[3] Fabricio Sergie de Paula, Leandro Nunes de Castro,and Paulo LIcio de Geus, “A Intrusion Detection System Using Ideas from the Immune System ”, IEEE 2004.
[4] Francisco Macia -Perez, Francisco J. Mora-Gimeno, Diego Marcos-Jorquera, Juan Antonio Gil-Martinez-Abarca, Hector Ramos-Morillo and Iren Lorenzo-Fonseca, “Network Intrusion Detection System Embedded on a Smart Sensor”, Transactions on industrial Electronics IEEE, Vol.58, No.3, March-2011.
[5] Bane Raman Raghunath, Shivsharan Nitin mahadeo, “Network Intrusion Detection System (NIDS)”, First International Conference on Emerging Trends in Engineering and Technology, IEEE 2008.
[6] Eigene C. Ezin, Herve Akakpo Djihountry, “Java-Based Intrusion Detection System in a Wired Network”, International Journal of Computer Science and Information Security, Vol. 9. No. 11, November 2011.
[7] Prof.D.P.Gailwad, Pooja Pabshettiwar, Priyanka Musale, Pooja Paranjape and Ashwini S. Pawar, “A Proposal for Implemenation of Signature Based Intrusion Detection System Using Multithreading Technique”, International Journal of Computational Engineering Research, Vol. 2, Issue. 7, November 2012.
[8] Chetan R and Ashoka D.V., “Data Mining Based Network Intrusion Detection System: A Database Centric Approach”, 201 International Conference on Computer Communication and Informatics IEEE, Jan.10-12, 2012.
[9] Archana D. Wankhede and Dr. P.N. Chatur, “Implementation of Intrusion Detection and Prevention System Using JPCAP/WINPCAP”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue. 5, May-2014

Keywords
HIDS, IDS, Intrusion, NIDS, Network Security, Packet.