Creating a Complete Model of an Intrusion Detection System effective on the LAN

Abstract

 the Intrusion Detection Systems (IDS) are now an essential component in the structure of network security. The logs of connections and network activity, with a large amount of information, can be used to detect intrusions. Despite the development of new technologies of information and communication following the advent of the Internet and networks, computer security has become a major challenge, and works in this research are becoming more numerous. Various tools and mechanisms are developed to ensure a level of security to meet the demands of modern life. Among the systems, intrusion detection for identifying abnormal behavior or suspicious activities to undermine the legitimate operation of the system. The objective of this paper is the design and implementation of a comprehensive architecture of IDS in a network.

Authors and Affiliations

Yousef FARHAOUI, Ahmed ASIMI

Keywords

Related Articles

Enhanced Version of Multi-algorithm Genetically Adaptive for Multiobjective optimization

Multi-objective EAs (MOEAs) are well established population-based techniques for solving various search and optimization problems. MOEAs employ different evolutionary operators to evolve populations of solutions for appr...

Compound Mapping and Filter Algorithm for Hybrid SSD Structure

With the recent development of byte-unit non-volatile random access memory (RAM), various methods utilizing quad level cell (QLC) not-AND (NAND) flash memory with non-volatile RAM have been proposed. However, tests have...

Implementation of Efficient Speech Recognition System on Mobile Device for Hindi and English Language

Speech recognition or speech to text conversion has rapidly gained a lot of interest by large organizations in order to ease the process of human to machine communication. Optimization of the speech recognition process i...

Big Brother: A Road Map for Building Ubiquitous Surveillance System in Nigeria

In this paper, we propose a method to improve the security challenges in Nigeria by embedding literally hundreds of invisible computers into the environment with each computer performing its tasks without requiring human...

Role of Explicit Knowledge Management and Reuse in Higher Educational Environment

Role of knowledge management and knowledge reuse has been investigated analytically in higher educational environment using Nonaka & Takeuchi and Harsh models. It has been observed that in three dimensional environment k...

Download PDF file
  • EP ID EP145657
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

Yousef FARHAOUI, Ahmed ASIMI (2012).  Creating a Complete Model of an Intrusion Detection System effective on the LAN. International Journal of Advanced Computer Science & Applications, 3(5), 147-150. https://europub.co.uk/articles/-A-145657