Requirement Based Intrusion Detection in Addition to Prevention Via Advanced Metering Infrastructure

Abstract

An intrusion detection system (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases, the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion. The proposed protocol called Password Guessing Resistant Protocol (PGRP), helps in preventing such attacks and provides a pleasant login experience for legitimate users. PGRP limits the number of login attempts for unknown users. In additional we propose an attack detector for cloud spoofing that utilizes MAC (Media access Control) and RSS (Received Signal strength) analysis. Next, we describe how we integrated our attack detector into a real-time indoor localization system, which is also capable of localizing the positions of the attackers.

Authors and Affiliations

Jonisha S/Ap

Keywords

Related Articles

Existence of positive solutions for fractional differential involving the discrete delta−nabla fractional boundary value problem with non-homogeneous boundary conditions

In this paper, we consider a nonlinear fractional boundary value problem with non-homogeneous boundary conditions: ( ( ( ))) ( ) ( ( )) ( ) ( )  ( )  ( ( ))       = − = + − =    + + − − + − − =  − = + − − −...

A Conceptual Paper on Critical Review of Recycling of Electronic Waste (E-Waste)

Electronic waste (e-waste) poses a great potential for accumulation of solid waste globally. It’s one of the fastest growing pollution problems worldwide. It has substantial varieties of harmful substance which can pollu...

Leadership Style of Buddhist Leader in Family Business

This study aims to determine the leadership style used by Buddhists in their family business to be successful in the business era. This type of research is qualitative, using data collection techniques, namely interviews...

Determinants Of Implementation Of County Water And Sanitation Programme In Maseno Division Of Kisumu West SubCounty, Kisumu County, Kenya

The provision of water and sanitation globally, is threatened by climate change and pollution. Many industrialized and developing countries alike are struggling to achieve universal safe water coverage of 100% piped wate...

Profile of Bicol Sucs: Basis for Policy Recommendation

T: This descriptive research is all about the profile of SUCs in Bicol Region, Philippines in terms of budget, program offerings, enrolment, and faculty and non-teaching personnel. The data were sourced from the 2016 bud...

Download PDF file
  • EP ID EP289049
  • DOI -
  • Views 143
  • Downloads 0

How To Cite

Jonisha S/Ap (2018). Requirement Based Intrusion Detection in Addition to Prevention Via Advanced Metering Infrastructure. Invention Journal of Research Technology in Engineering & Management, 2(4), 56-58. https://europub.co.uk./articles/-A-289049