Creating a Complete Model of an Intrusion Detection System effective on the LAN

Abstract

 the Intrusion Detection Systems (IDS) are now an essential component in the structure of network security. The logs of connections and network activity, with a large amount of information, can be used to detect intrusions. Despite the development of new technologies of information and communication following the advent of the Internet and networks, computer security has become a major challenge, and works in this research are becoming more numerous. Various tools and mechanisms are developed to ensure a level of security to meet the demands of modern life. Among the systems, intrusion detection for identifying abnormal behavior or suspicious activities to undermine the legitimate operation of the system. The objective of this paper is the design and implementation of a comprehensive architecture of IDS in a network.

Authors and Affiliations

Yousef FARHAOUI, Ahmed ASIMI

Keywords

Related Articles

Genetic-Based Task Scheduling Algorithm in Cloud Computing Environment

Nowadays, Cloud computing is widely used in companies and enterprises. However, there are some challenges in using Cloud computing. The main challenge is resource management, where Cloud computing provides IT resources (...

Unsupervised Ads Detection in TV Transmissions

A novel framework is presented that can segment semantic videos and detect commercials (ads) in a broadcasted TV transmission. The proposed technique combines SURF features and color Histogram in a weighted combination f...

FPGA Implementation of RISC-based Memory-centric Processor Architecture

The development of the microprocessor industry in terms of speed, area, and multi-processing has resulted with increased data traffic between the processor and the memory in a classical processor-centric Von Neumann comp...

Multi-Biometric Systems: A State of the Art Survey and Research Directions

Multi-biometrics is an exciting and interesting research topic. It is used to recognizing individuals for security purposes; to increase security levels. The recent research trends toward next biometrics generation in re...

A P System for Solving All-Solutions of TSP

P system is a parallel computing system based on a membrane computing model. Since the calculation process of the P system has the characteristics of maximum parallelism and Non-determinism, it has been used to solve the...

Download PDF file
  • EP ID EP145657
  • DOI -
  • Views 56
  • Downloads 0

How To Cite

Yousef FARHAOUI, Ahmed ASIMI (2012).  Creating a Complete Model of an Intrusion Detection System effective on the LAN. International Journal of Advanced Computer Science & Applications, 3(5), 147-150. https://europub.co.uk/articles/-A-145657