NETWORK INTRUSION DETECTION SYSTEM IN MESH TOPOLOGY
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 5, Issue 2
Abstract
The NIDS is a term which specify about the introduction of the malicious attacks which takes place in the networks. This paper focuses on the types of the attacks which are made on the networks and the prevention technique which will help the network to avoid an intrusion in the network. The paper focuses on the terms that how the confidentiality, integrity, and assurance would be provided in the network.NIDS perform analysis of all traffic passing on a network fragment or subnet.Perform packet sniffing and analyze network traffic to identify and stop bads activity. They are typically deployed inline. Like a network firewall. They receive packets, analyze them, decision whether they should be permitted, and enable acceptable packets to pass through.Network-based products might be able to detect and stop some unknown warning through application protocol analysis.However, network-based products are generally not capable of closing malicious or vicious mobile code or Trojan horses. An IDS is a network security technology used originally built for detecting vulnerability exploits a target application or computer. The IDS is also listen only device. It can monitor the traffic traveling to or from different device on that network. There are mainly two type’s approaches. First approach name is signature based system and the second approach is anomaly based system.
Authors and Affiliations
Popalghat Pooja S
IP Over DWDM
This paper completely deals with optical signal transmission; with encapsulation entire raw packets are converted as optical signals. Since the usage of internet and intranet are increasing day by day, the demands...
Environmental Aspects of Iron ORE Mining
Iron ore mining activities such as top soil stripping, drilling and blasting extraction of ore, waste rock dumping, loading and unloading of ore, crushing and screening, material transport etc., emit both fugitive...
PERFORMANCE ANALYSIS OF EARTH TUBE HEAT EXCHANGER
This study performs an analysis of Earth Tube Heat Exchangers used to improve the efficiency of heating, ventilation, and air conditioning (HVAC) systems. ETHE can be used in either a heating or cooling mode by taking ad...
REVIEW ON SYNTHESIS, CHARACTERISATION AND BIOACTIVITY OFCHITOSAN
One of the most widespread biopolymer in nature, after cellulose, is chitin. It can be extracted from sources likecrustaceans, microorganisms and insects. However, the main commercial sources of chitin are shells o...
Risk Analysis and Mitigation Plan in Software Development
Software development, often encounter many unanticipated problems, resulting in projects falling behind on deadlines, releases, exceeding budgets and result in sub-standard products due to its complex nature. Alth...