Functioning of Intelligence Intrusion Multi Detection Prevention Systems (IIMDPS)

S. Murugan*, K.Kuppusamy**
* Research Scholar, Department of Computer Science and Engineering, Alagappa University, Karaikudi, Tamilnadu, India.
** Professor, Department of Computer Science and Engineering, Alagappa University, Karaikudi, Tamilnadu, India.
Periodicity:December - February'2016
DOI : https://doi.org/10.26634/jit.5.1.4798

Abstract

This paper focuses on functioning of Intelligence Intrusion Multi Detection Prevention Systems (IIMDPS). It describes the prevention of unknown malware with the help of mathematical scheme and few models with newly designed algorithm. This is designed to provide a deeper understanding of existing intrusion detection principles with intelligence strategies, that will be responsible for acquiring unknown malware, which compare the false positive rate and the false negative rate. That will be proven by conducting different experiments with WEKA simulation.

Keywords

Intelligence Intrusion Detection Prevention System (IIDPS), Unknown Malware, Intelligence Intrusion Multi Detection Prevention Systems (IIMDPS).

How to Cite this Article?

Murugan. S and Kuppusamy. K (2016). Functioning of Intelligence Intrusion Multi Detection Prevention Systems (IIMDPS). i-manager’s Journal on Information Technology, 5(1), 18-27. https://doi.org/10.26634/jit.5.1.4798

References

[1]. Meystel, A.M. &Albus, J.M., (2002). Intelligent Systems Architecture, Design, and Control. New York, New York, John Wiley & Sons, Inc.
[2]. Hentea, M. (1997). “Architecture and design issues in a hybrid knowledge-based expert system for intelligent quality control”. PhD Thesis, Illinois Institute of Technology, Chicago, Illinois.
[3]. Hentea, M. (1999). “Intelligent approach for network management system: Architecture and design issues for ATM computer networks”. Proceedings of 1999 Advanced Simulation Technologies Conference, San Diego, California.
[4]. Hentea, M. (2003). “Intelligent model for cyber attack detection and prevention”. Proceedings of the ISCA 12th International Conference Intelligent and Adaptive Systems and Software Engineering, San Francisco, California, pp. 5-10.
[5]. Hentea, M. (2004). “Data mining descriptive model for intrusion detection systems”. Proceedings of the 2004 Information Resources Management Association International Conference, New Orleans, Louisiana, pp. 1118-1119.
[6]. Hentea, M. (2005a). “Improving intrusion awareness with a neural network classifier”. Proceedings of the ISCA 14th International Conference Intelligent and Adaptive Systems and Software Engineering, Toronto, Canada, 163-168
[7]. Hentea, M. (2005b). “Use of reconnaissance patterns for intelligent monitoring model”. Proceedings of the 2005 Information Resources Management Association International Conference, San Diego, California, pp. 160- 163.
[8]. Hentea, M. (2006). “Enhancing information security risk management with a fuzzy model”. Proceedings of 19th International Conference on Computer Applications in Industry and Engineering, Las Vegas, Nevada, pp. 32-139.
[9]. Wang, W. (2005). The Intelligent Proactive Information Assurance and Security Technology. Retrieved on January 5, 2005.
[10]. Wang, J., et al., (2007). "Internet Worm Early Detection and Response Mechanism". The Journal of China Universities of Posts and Telecommunications, Vol. 14, No. 3,
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.