Creating a Complete Model of an Intrusion Detection System effective on the LAN
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 5
Abstract
the Intrusion Detection Systems (IDS) are now an essential component in the structure of network security. The logs of connections and network activity, with a large amount of information, can be used to detect intrusions. Despite the development of new technologies of information and communication following the advent of the Internet and networks, computer security has become a major challenge, and works in this research are becoming more numerous. Various tools and mechanisms are developed to ensure a level of security to meet the demands of modern life. Among the systems, intrusion detection for identifying abnormal behavior or suspicious activities to undermine the legitimate operation of the system. The objective of this paper is the design and implementation of a comprehensive architecture of IDS in a network.
Authors and Affiliations
Yousef FARHAOUI, Ahmed ASIMI
Enhanced Version of Multi-algorithm Genetically Adaptive for Multiobjective optimization
Multi-objective EAs (MOEAs) are well established population-based techniques for solving various search and optimization problems. MOEAs employ different evolutionary operators to evolve populations of solutions for appr...
Compound Mapping and Filter Algorithm for Hybrid SSD Structure
With the recent development of byte-unit non-volatile random access memory (RAM), various methods utilizing quad level cell (QLC) not-AND (NAND) flash memory with non-volatile RAM have been proposed. However, tests have...
Implementation of Efficient Speech Recognition System on Mobile Device for Hindi and English Language
Speech recognition or speech to text conversion has rapidly gained a lot of interest by large organizations in order to ease the process of human to machine communication. Optimization of the speech recognition process i...
Big Brother: A Road Map for Building Ubiquitous Surveillance System in Nigeria
In this paper, we propose a method to improve the security challenges in Nigeria by embedding literally hundreds of invisible computers into the environment with each computer performing its tasks without requiring human...
Role of Explicit Knowledge Management and Reuse in Higher Educational Environment
Role of knowledge management and knowledge reuse has been investigated analytically in higher educational environment using Nonaka & Takeuchi and Harsh models. It has been observed that in three dimensional environment k...