Requirement Based Intrusion Detection in Addition to Prevention Via Advanced Metering Infrastructure

Abstract

An intrusion detection system (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases, the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion. The proposed protocol called Password Guessing Resistant Protocol (PGRP), helps in preventing such attacks and provides a pleasant login experience for legitimate users. PGRP limits the number of login attempts for unknown users. In additional we propose an attack detector for cloud spoofing that utilizes MAC (Media access Control) and RSS (Received Signal strength) analysis. Next, we describe how we integrated our attack detector into a real-time indoor localization system, which is also capable of localizing the positions of the attackers.

Authors and Affiliations

Jonisha S/Ap

Keywords

Related Articles

The effect of functionalized carbon nanotubes on thermal-mechanical performance of Epoxy nanocomposite coatings

The new approaches for preparing nanocomposite coating by modificated carbon nanonotubes (CNTs) and epoxy resin was done in the study. thermal-mechanical performance of nanocomposite coating was investigated and the resu...

Resource recycling and waste-to-energy: The cornerstones of circular economy

"Circular Economy" is the pursued goal of sustainable development of mankind for the 21st century. In short, the fundamental spirit of circular economy is the concept of "Zero Waste". The example used in our daily lives...

GREEN CHEMISTRY: A PRIMER

With mounting concerns over the state of our planet, there is continuing demand that chemists and chemical engineers should develop greener chemical processes and products. In the 1990s, with the growing awareness of the...

Food Ethics: A Primer

Food is used in expressing social relations in many ways. Ethics deals with reasoning and judging about rights and wrongs in relations. Food ethics is related to agriculture, its production, marketing, distribution, prep...

A Conceptual Paper on Critical Review of Recycling of Electronic Waste (E-Waste)

Electronic waste (e-waste) poses a great potential for accumulation of solid waste globally. It’s one of the fastest growing pollution problems worldwide. It has substantial varieties of harmful substance which can pollu...

Download PDF file
  • EP ID EP289049
  • DOI -
  • Views 149
  • Downloads 0

How To Cite

Jonisha S/Ap (2018). Requirement Based Intrusion Detection in Addition to Prevention Via Advanced Metering Infrastructure. Invention Journal of Research Technology in Engineering & Management, 2(4), 56-58. https://europub.co.uk/articles/-A-289049