NETWORK INTRUSION DETECTION SYSTEM IN MESH TOPOLOGY

Abstract

The NIDS is a term which specify about the introduction of the malicious attacks which takes place in the networks. This paper focuses on the types of the attacks which are made on the networks and the prevention technique which will help the network to avoid an intrusion in the network. The paper focuses on the terms that how the confidentiality, integrity, and assurance would be provided in the network.NIDS perform analysis of all traffic passing on a network fragment or subnet.Perform packet sniffing and analyze network traffic to identify and stop bads activity. They are typically deployed inline. Like a network firewall. They receive packets, analyze them, decision whether they should be permitted, and enable acceptable packets to pass through.Network-based products might be able to detect and stop some unknown warning through application protocol analysis.However, network-based products are generally not capable of closing malicious or vicious mobile code or Trojan horses. An IDS is a network security technology used originally built for detecting vulnerability exploits a target application or computer. The IDS is also listen only device. It can monitor the traffic traveling to or from different device on that network. There are mainly two type’s approaches. First approach name is signature based system and the second approach is anomaly based system.

Authors and Affiliations

Popalghat Pooja S

Keywords

Related Articles

 PERFORMANCE OPTIMIZATION OF LUT IN FPGA USING CNFET

 A Leakage power dissipation is becoming a concern in field-programmable gate arrays (FPGAs) due to scaling in FPGA technology. Field programmable gate arrays (FPGAs) are the implementation platform of choice w...

 A SURVEY ON HEART DISEASE PREDICTION USING SOFT COMPUTING

 Large number of people has being affected due to heart disease and it has become a major problem. One of such threat is Cardiovascular Disease (CVD). If it is not treated and detected at an early and proper stage...

PERFORMANCE EVALUATION OF BLENDS OF MAHUA OIL METHYL ESTER FOR COMPRESSION IGNITION ENGINE

Decline in fossil fuel resources along with high crude oil prices generated attention towards the development of fuel from alternate sources. One of the best alternatives is biodiesels obtained from different vegetable...

 Friction Stir Welding Processes: A Review

 Friction Stir Welding is a novel green solid state joining process particularly used to join high strength aerospace aluminum alloys which are otherwise difficult to weld by conventional fusion welding. Unlike oth...

 Feature Extraction from Informal Text for Opinion Mining

 With the rapid development of web, most of the customers express their opinions on various kinds of entities, such as products and services on web. These reviews provide useful information to customers for referen...

Download PDF file
  • EP ID EP133366
  • DOI -
  • Views 71
  • Downloads 0

How To Cite

Popalghat Pooja S (0). NETWORK INTRUSION DETECTION SYSTEM IN MESH TOPOLOGY. International Journal of Engineering Sciences & Research Technology, 5(2), 108-111. https://europub.co.uk/articles/-A-133366