NETWORK INTRUSION DETECTION SYSTEM IN MESH TOPOLOGY

Abstract

The NIDS is a term which specify about the introduction of the malicious attacks which takes place in the networks. This paper focuses on the types of the attacks which are made on the networks and the prevention technique which will help the network to avoid an intrusion in the network. The paper focuses on the terms that how the confidentiality, integrity, and assurance would be provided in the network.NIDS perform analysis of all traffic passing on a network fragment or subnet.Perform packet sniffing and analyze network traffic to identify and stop bads activity. They are typically deployed inline. Like a network firewall. They receive packets, analyze them, decision whether they should be permitted, and enable acceptable packets to pass through.Network-based products might be able to detect and stop some unknown warning through application protocol analysis.However, network-based products are generally not capable of closing malicious or vicious mobile code or Trojan horses. An IDS is a network security technology used originally built for detecting vulnerability exploits a target application or computer. The IDS is also listen only device. It can monitor the traffic traveling to or from different device on that network. There are mainly two type’s approaches. First approach name is signature based system and the second approach is anomaly based system.

Authors and Affiliations

Popalghat Pooja S

Keywords

Related Articles

 HandiCom: Handheld Deaf and Dumb Communication Device based on Gesture to

 Our project aim is to build a handheld device that would help deaf and dumb people to communicate with others in every day spoken language such as English. Deaf and dumb often communicate via sign language, a kind...

 STIMULATING TRANSIENT EFFECT ON BITUMEN PROPERTIES USING SASOBIT – A WARM MIX ADDITIVE FOR PAVEMENT

 The advancement of any economy anyplace on the world needs long lasting base sophisticated infrastructure that roads, air terminal runways and parking lots, so one can see the value of bitumen with time and changi...

 MEASURES FOR FAULT EVALUATION IN MOBILE AGENT SYSTEMS

 Mobile agent is intelligent, autonomous, ragged, interactive, coordinative, cooperative and proactive agents. There arise many problems while moving the data, so to resolve such hindrances, mobile agent moves itse...

Data Mining and Data Warehousing

Today in organizations, the developments in the transaction processing technology requires that, amount and rate of data capture should match the speed of processing of the data into information which can be utilized fo...

Structural and Spectral Analysis Host Bi2O3-B2O3-LiF and RE3+(Ho3+ or Pr3+): Bi2O3- B2O3-LiF Glasses

Bismuth borate glasses in the composition of 20Bi2O3-50B2O3-30LiF (BiBLF) have been prepared by using conventional melt quenching method. Thermal analysis (Tg-DTA) structural (XRD, FTIR and Raman), SEM micro graph and...

Download PDF file
  • EP ID EP133366
  • DOI -
  • Views 51
  • Downloads 0

How To Cite

Popalghat Pooja S (0). NETWORK INTRUSION DETECTION SYSTEM IN MESH TOPOLOGY. International Journal of Engineering Sciences & Research Technology, 5(2), 108-111. https://europub.co.uk/articles/-A-133366