Providing the Secure Data Transmission in the Network Using Open Source Packet Analyzer
Hasina A. Razzak A. Karim , S S Handa , M V Ramana Murthy."Providing the Secure Data Transmission in the Network Using Open Source Packet Analyzer". International Journal of Computer Trends and Technology (IJCTT) V12(1):11-13, June 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Intrusion Detection System (IDS) is process of detecting intrusion in database, network or any other devicefor providing secure data transmission. In this paper, our purpose of IDS is to detect intrusion in network to provide safe and intrusion free network by using Open Source Packet Analyzer. Open Source Packet Analyzer is used to analyze network data and then that data is classified into normal data and abnormal data.
References
[1]Usha Banerjee , AshutoshVashishtha and MukulSaxena, Evaluation of the capabilities of wireshark as a tool for intrusion detection
[2]Jeff Markey, Using Decision Tree Analysis for Intrusion Detection Russ McRee, Security Analysis withWireshark.
[3][BOOK] Data mining: concepts and techniques J Han, M Kamber - 2006
[4] Qadeer, M.A. Zahid, M. ;Iqbal, A. ; Siddiqui, M.R. Network Traffic Analysis and Intrusion Detection Using PacketSniffer
[5]Shaoqiang Wang, DongShengXu, ShiLiang Yan, Analysis and Application of Wireshark in TCP/IP Protocol.
[6]Luo, H., Henry, P.: A common password method for protection of multipleaccounts. 14th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Vol. 3 (2003) 2749 – 2754
[7] Pinkas, B., Sander, T.: Securing passwords against dictionary attacks Proceedings of the 9th ACM conference on Computer and communications security Washington, DC, USA (2002 ) 161-170
[8] Gouda, M.G., Liu, A.X., Leung, L.M., Alam, M.A.: Single Password, Multiple Accounts. Proceedings of 3rd Applied Cryptography and Network Security Conference (industry track), New York City, New York (2005)
Keywords
Intrusion Detection System, Data Mining Techniques, TCP/UDP protocol, DOS attack