NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 2, Issue 3
Abstract
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.
Authors and Affiliations
Harpreet kaur
STUDENTS LEARNING PATHS AS ˜'DYNAMIC ENCEPHALOGRAPHS' OF THEIR COGNITIVE DEVELOPMENT
The current study presents excerpts of my PhD thesis in which I developed a 'dynamic' hypothetical learning path (DHLP) with regard to student's cognitive development. The aim was to investigate if they would raise their...
On the Cloud Web services: A Review
Cloud Computing is a constantly evolving IT generic term used to refer to various IT solutions and services provided via the internet. Precisely, cloud computing can be said to be  the delivery of scalable IT resource...
Cloud based Cost Effective Resource Allocation Model for Software-as-a-service Deployments
The Cloud Computing (CC) provides access to the resources with usage based payments model. The application service providers can seamlessly scale the services. In CC infrastructure, a different number of virtual machine...
A Multi-Level Multi-Objective Quadratic Programming Problem with Fuzzy Parameters on Objective Functions
This paper proposes an algorithm to solve multi-level multi-objective quadratic programming problem with fuzzy parameters in the objective functions, This algorithm uses the tolerance membership function concepts and mul...
AUTOMATIC ROAD DETECTION OF SATELLITE IMAGES USING IMPROVED EDGE DETECTION
Road networks play an important role in a number of geospatial applications, such as cartographic, infrastructure planning and traffic routing software. Automatic and semi-automatic road network extraction techniques hav...