COST MINIMIZATION MODEL FOR AN ADAPTIVE INTRUSION RESPONSE SYSTEM
Journal Title: Indian Journal of Computer Science and Engineering - Year 2012, Vol 3, Issue 2
Abstract
As attacks on computer systems are becoming increasingly numerous and sophisticated, there is a growing need for intrusion detection and response systems to dynamically adapt to better detect and respond to attacks. Annual reports from the Computer Emergency Response Team (CERT) indicated a significant increase in the number of computer security incidents each year. In this paper, we investigate the intrusion detection process, its technical cost implication, and its divergent nature and further proposes a system that is platform independent for an appropriate impact sensitive intrusion response system with an embedded database. We carry out several experiments on attack and present our result in form of graphs and data analysis. The paper compares several response systems and discusses it challenges in a continuous growing networking society as it is today. We finally propose an adaptive model for intrusion response system that saves technical cost for network administrators.
Authors and Affiliations
Enikuomehin A. Toyin , Idowu A. Gbolahan , Akerele C. Bunmi , Owate A. Patrick . , Aina Bidemi Aina
RANK LEVEL FUSION USING FINGERPRINT AND IRIS BIOMETRICS
Authentication of users is an essential and difficult to achieve in all systems. Shared secrets like Personal Identification Numbers (PIN) or Passwords and key devices such as Smart cards are not presently sufficient in...
BIO-PROGRAMMING PROSPECTS OF JAVA: A COMPUTATIONAL MOVE TOWARDS THE UNDERSTANDING OF THE BIOLOGICAL ASPECTS OF GENES AND PROTEINS
Java is a powerful object oriented programming language that dominates many other programming languages for more than a decade. It is well designed and available as many executable technologies for software development s...
An Optimized Secure Communication Using VLR-GS-BU on Wireless Network
A novel protocol to achieve privacy-preserving universal authentication protocol for wireless communications called Priauth. to secure the communication as the data are sensitive or it requires the users to pay for it. I...
A study on different approaches towards Aspect Oriented Requirements Engineering
Requirements and their quality are very important for the success and on time delivery of a project. However, Requirement Elicitation is not an easy and small task to begin with. Conflicts arise in various ways such as w...
FUSION OF MULTI FOCUSED IMAGES USING HDWT FOR MACHINE VISION
During image acquisition in machine vision, due to limited depth of field of lens, it is possible to take clear image of the objects in the scene which are in focus only. The remaining objects in the scene will be out of...