Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Meera Gandhi, S.K.Srivatsa
Pages - 49 - 60     |    Revised - 15-02-2008     |    Published - 30-02-2008
Volume - 2   Issue - 1    |    Publication Date - February 2008  Table of Contents
intruders, information security, real time IDS, attacks, signature
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. It has been implemented in VC++. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.
CITED BY (21)  
1 Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1.
2 Rao, P. M., & Raju, G. S. N. (2014). International Journal of Advanced Research in Computer Science and Software Engineering. International Journal, 4(12).
3 Nugroho, H. T., & Wicaksono, B. A. (2013). Utilizing Instant Messaging for Real-Time Notification and Information Retrieval of Snort Intrusion Detection System. ISICO 2013.
4 Manivannan, S. S., & Sathiyamoorthy, E. An Efficient and Accurate Intrusion Detection System to detect the Network Attack Groups using the Layer wise Individual Feature Set.
5 Devaraju, S., & Ramakrishnan, S. (2013). Performance comparison of intrusion detection system using various techniques–A review. ICTACT Journal on Communication Technology, 4(3), 802-812.
6 Dabbour, M., Alsmadi, I., & Alsukhni, E. (2013). Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT. International Journal of Security and its Applications IJAST, 7(1).
7 Arunachalam, V. P., & Ravichandran, T. A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback. International Journal of Computer Science and Security (IJCSS), 3(4), 272.
8 Barreto, rdmm right, cyberspace and networks: consumer protection challenges in social commerce.
9 Bucure?ti, U. P., & si Calculatoare, F. D. A. A Practical Analysis of Intrusion Detection Techniques on a Linux Environment.
10 Ruse, L. C. A Practical Analysis of Intrusion Detection Techniques on a Linux Environment.
11 Awodele, O., Onuiri, E. E., & Okolie, S. O. Vulnerabilities in Network Infrastructures and Prevention/Containment Measures.
12 Muda, Z., Yassin, W., Sulaiman, M. N., & Udzir, N. I. (2011). A K-Means and Naive Bayes learning approach for better intrusion detection. Information technology journal, 10(3), 648-655.
13 4. Z.Muda, W.Yasin, M.N.Sulaiman and N.I.Udzir, “A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection” International Technology Journal, 10(3), pp. 648-656, 2011.
14 C. Manusankar, S. Karthik and T. Rajendran, “Intrusion Detection System with Packet Filtering for IP Spoofing”, in Proceedings of Communication and Computational Intelligence (INCOCCI), 2010 International Conference, Erode, 27-29 Dec. 2010, pp. 563 – 567.
15 L. Gheorghe, R. Rughinis and N. Tapus, “Attack Evaluation and Mitigation Framework”, in Proceedings, Networking and Services (ICNS), 2010 Sixth International Conference , Cancun, 7-13 March 2010, pp. 243 – 252.
16 Gandhi, M., & Srivatsa, S. K. (2010). Combination of RBF Algorithm and Filters Applied to Prevent Attacks in a Web Server. International Journal of Computational Intelligence Research, 6(2).
17 Sundararajan, T. V. P., & Shanmugam, D. A. (2009). Behavior based anomaly detection technique to mitigate the routing misbehavior in manet. International Journal of Computer Science and Security, 3(2), 62-75.
18 S. P. T. Vinay and A. Shanmugam, “Behavior Based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET”, International Journal of Computer Science and Security (IJCSS), 3(2), pp. 62 – 75, 2009.
19 E. Nikolova and V. Jecheva, “Anomaly Based Intrusion Detection Using Data Mining and String Metrics”, in Proceedings of Communications and Mobile Computing, CMC '09. WRI International Conference , Yunnan, 6-8 Jan. 2009, pp. 440 – 444.
20 A. S. Hosam, A. Mustafa, S. Ahmad and M. Abbas, “Exception Agent Detection System for IP Spoofing Over Online Environments”, International Journal of Computer Science and Information Security, 6(1), pp. 158-164, 2009.
21 S. Karthik, V. P. Arunachalam and T. Ravichandran, “A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback”, International Journal of Computer Science and Security (IJCSS), 3(4), pp. 272 - 279, 2009.
1 Google Scholar 
2 ScientificCommons 
3 Academic Index 
4 CiteSeerX 
5 iSEEK 
6 Socol@r  
7 ResearchGATE 
8 Bielefeld Academic Search Engine (BASE) 
9 Scribd 
10 WorldCat 
11 SlideShare 
13 PdfSR 
1 "Symantec-Internet Security threat report highlights (Symantec.com)", http://www.prdomain.com/companies/Symantec/newrelea ses/Symantec_internet_205032.htm
2 Symantec Security Response, W32.ExploreZip.L.Worm, http://securityresponse.symantec.com/avcenter/venc/data/w32.explorezip.l.worm.html , January 2003.
3 Komninos T., Spirakis P.: Dare the Intruders, Ellinika Grammata and CTI Press (2003).
4 E. Biermann, E.Cloete, L.M. Venter, A comparison of Intrusion detection systems, Computers and Security, 20(2001)8, 676–683. [5] P. Ning and D. Xu. Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Transactions on Information and System Security, 7(4):591– 627, November 2004
5 Herringshaw, C. (1997) ‘Detecting attacks on networks’, IEEE Computer Society Vol.30, pp.16 – 17.
6 International Standard IS0 7498.2, Information processing system - Open system interconnection – Basic reference model, PaR 2: Security architecture, 1989.
7 D. Oollmann, Cornpuler Security, John Wiley & Sons, 1999.
8 R.G. Bace, Intrusion Detection. Macmillan Technical Publishing, 2000
9 Komninos T, Spirakis P., Stamatiou et.al..: A Software Tool for Distributed Intrusion Detection in Computer Networks (Helena) (Best Poster presentation in PODC 2004).
10 Patwardhan, A. Parker, J., Joshi,A., Karygiannis, A., and Iorga,M. “Secure Routing and Intrusion Detection in Ad Hoc Networks”, Third IEEE International Conference on Pervasive Computing and Communications, Kauai Island, Hawaii, 2005.
11 http://www.winpcap.org/ - Obtained drivers for packet capture with wpcap.dll and packet.dll driver.
12 http://www.karalon.com - Obtained Karalon IQ professional tool for testing our network intrusion detection system.
13 http://www.securityfocus.com – White papers for intrusion detection techniques and methodologies.
14 R. Lippmann, The Role of Network Intrusion Detection, In Proceedings of the Workshop on Network Intrusion Detection, H.E.A.T. Center, Aberdeen, MD, March 19-20, 2002.
15 SNORT Intrusion Detection System, www.snort.org, 2004.
16 Snort-Wireless Intrusion Detection, http://snort-wireless.org, 2003.]
17 NFR Network Intrusion Detection, http://www.nfr.com/products/NID/, 2001.
18 Cisco Systems, Inc., NetRanger-Enterprise-scale, Real-time, Network Intrusion Detection System, http://www.cisco.com/univercd/cc/td/doc/product/iaabu/netrangr/, 1998.
19 Internet Security Systems, Inc., RealSecure, http://www.iss.net/prod/rsds.html, 1997.
20 Intrusion.com, Intrusion SecureHost, white paper available at: www.intrusion.com/products/hids.asp , 2003.
21 J. Van Ryan, SAIC's Center for Information Security, Technology Releases CMDS Version 3.5, http://www.saic.com/news/may98/news05-15-98.html, 1998.
22 N. Weaver, V. Paxson, S. Staniford and R. Cunningham, A Taxonomy of Computer Worms, In Proceedings of the The Workshop on Rapid Malcode (WORM 2003), held in conjunction with the 10th ACM Conference on Computer and Communications Security, Washington, DC, October 27, 2003.
23 Wheel Group Corporation, Cisco Secure Intrusion Detection System, http://www.cisco.com/univercd/cc/td/doc/product/iaabu/csids/index.htm , 2004
24 P. Ning and D. Xu. Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Transactions on Information and System Security, 7(4):591– 627, November 2004
Mr. Meera Gandhi
- India
Mr. S.K.Srivatsa
- India